Sie sind auf Seite 1von 204

AN5516-06

Optical Line Terminal Equipment

Feature Description
Version: A

Code: MN000000818

FiberHome Telecommunication Technologies Co., Ltd.

May 2011
Thank you for choosing our products.

We appreciate your business. Your satisfaction is our

goal. We will provide you with comprehensive technical

support and after-sales service. Please contact your

local sales representative, service representative or

distributor for any help needed at the contact information

shown below.

Fiberhome Telecommunication Technologies Co., Ltd.

Address: No. 5 Dongxin Rd., Hongshan Dist., Wuhan, China


Zip code: 430073
Tel: +86 27 8769 1549
Fax: +86 27 8769 1755
Website: http://www.fiberhomegroup.com
Legal Notice

TM

TM
TM

are trademarks of FiberHome Telecommunication Technologies Co., Ltd.


(Hereinafter referred to as FiberHome)
All brand names and product names used in this document are used for
identification purposes only and are trademarks or registered trademarks
of their respective holders.

All rights reserved


No part of this document (including the electronic version) may be
reproduced or transmitted in any form or by any means without prior
written permission from FiberHome.
Information in this document is subject to change without notice.
Preface

Related Documentation

Document Description
AN5516-06 Optical Line Introduces the retrieval method, contents, releasing,
Terminal Equipment reading approach, and suggestion feedback method for
Documentation Guide the complete manual set for the AN5516-06.
Introduces the AN5516-06s network location, functional
features, hardware structure, FTTx application model,
AN5516-06 Optical Line
equipment configuration, network management system
Terminal Equipment Product
and technical specifications. It is the foundation of the
Description
complete manual set. The other manuals extend and
enrich the concepts introduced in the Product Description.
Introduces the key features supported by the AN5516-06,
including GPON / EPON access, GPON / EPON terminal
AN5516-06 Optical Line
management, VLAN, broadcast, voice and safety; and
Terminal Equipment Feature
introduces these functions in details in terms of definition,
Description
characteristic, specification, principle description,
references and so on.
Introduces the method for configuring the EPON services
supported by the equipment via ANM2000 Network
AN5516-06 Optical Line Management System, such as basic configuration, voice
Terminal Equipment EPON service configuration, data service configuration, multicast
Configuration Guide service configuration, and software upgrading
configuration, to guide users on start-up for various
services and software upgrading.
Introduces the method for configuring the GPON services
supported by the equipment via ANM2000 Network
AN5516-06 Optical Line Management System, such as basic configuration, voice
Terminal Equipment GPON service configuration, data service configuration, multicast
Configuration Guide service configuration, and software upgrading
configuration, to guide users on start-up for various
services and software upgrading.

I
Document Description
Introduces the appearance, structure, functions, technical
AN5516-06 Optical Line
specifications, and usage method for the AN5516-06s
Terminal Equipment Hardware
cabinet, PDP, subrack, cards, cables and wires, facilitating
Description
users mastery of the hardware features of the equipment.
Introduces the overall installation and verifying procedure
from unpacking inspection to power-on examination after
AN5516-06 Optical Line
the equipment is delivered on site, and provides reference
Terminal Equipment Installation
information (e.g. safety principles and wiring scheme of a
Guide
variety of interfaces) to guide users to install the
equipment.
Introduces the shortcut menu for every card of the
AN5516-06 inside ANM2000 Network Management
AN5516-06 Optical Line
System, including the function, parameter explanation,
Terminal Equipment GUI
precautions and configuration example of every command
Reference
in the shortcut menu of each card, to help users master
the operation of the AN5516-06 inside ANM2000.
Introduces the operation procedures of replacing the
AN5516-06 Optical Line AN5516-06s components, including preparations,
Terminal Equipment Component precautions, early operations, operation process and
Replacement subsequent operations, so as to guide users with the
completion of component replacement on the hardware.
Introduces the remote and on-site routine maintenance
AN5516-06 Optical Line
operations of the AN5516-06. Users are able to eliminate
Terminal Equipment Routine
the potential risks in the equipment operation process as
Maintenance
early as possible via implementing routine maintenance.
Introduces the AN5516-06s alarm information, including
AN5516-06 Optical Line
alarm names, alarm levels, possible reasons, effects on
Terminal Equipment Alarm and
the system, and processing procedure, to guide users on
Event Reference
effective alarm processing.
Introduces the fault processing principles and methods of
fault diagnosis and locating for the AN5516-06. Also
AN5516-06 Optical Line
discusses the typical fault cases of various EPON
Terminal Equipment EPON
services. If the trouble is too complicated to process,
Troubleshooting Guide
users can refer to FiberHome for technical support
according to the instructions in this document.

II
Document Description
Introduces the fault processing principles and methods of
fault diagnosis and locating for the AN5516-06. Also
AN5516-06 Optical Line
discusses the typical fault cases of various GPON
Terminal Equipment GPON
services. If the trouble is too complicated to process,
Troubleshooting Guide
users can refer to FiberHome for technical support
according to the instructions in this document.

III
Version

Version Description
Initial version.
A
This manual is for the AN5516-06 equipment (V1.0).

This manual introduces the key GPON / EPON features supported by the
AN5516-06.

Intended Readers

This manual is intended for the following readers:

Commissioning engineers

Operation and maintenance engineers

To utilize this manual, these prerequisite skills are necessary:

Access network technology

EPON principle

GPON principle

Ethernet switch technology

Computer network technology

Basic operation methods of the ANM2000

IV
Conventions

Terminology Conventions

Terminology Convention
AN5516-06 FiberHome AN5516-06 Optical Line Terminal Equipment
FiberHome e-Fim ANM2000 Broadband Access Network
ANM2000
Management System
EC4B 4EPON-C Interface Card (type B)
EC8B 8EPON-C Interface Card (type B)
GC4B 4GPON-B Interface Card (type B)
GC8B 8GPON-C Interface Card (type B)
C155A 1STM-1 Optical Interface Card (CES Mode)
CE1B 32E1 Optical Interface Card (CES mode) (type B)
PUBA Public Card (type A)
HSWA Core Switch Card (EPON) (card No.: 2.115.334)
HU1A 4GE +110GE Optical Interface Uplink Card
HU2A 2GE +210GE Optical Interface Uplink Card
GU6F 6GE Optical Interface Uplink Card
CIO Common Interface Card
PWR Power Supply Card
FAN Fan Control Card

Symbol Conventions

Symbol Convention Description

Note Important features or operation guide.

Possible injury to persons or systems, or cause traffic


Caution
interruption or loss.

Warning May cause severe bodily injuries.

V
Contents

Preface .................................................................................................................... I

Related Documentation...................................................................... I
Version ....................................................................................... IV
Intended Readers ............................................................................ IV
Conventions ...................................................................................... V

1 EPON Access ............................................................................................... 1-1

1.1 Definition ........................................................................................ 1-2


1.2 Features ......................................................................................... 1-2
1.3 Specifications ................................................................................. 1-2
1.4 Basic Principles .............................................................................. 1-3
1.5 Reference Information ................................................................... 1-7

2 GPON Access .............................................................................................. 2-1

2.1 Definition ........................................................................................ 2-2


2.2 Features ......................................................................................... 2-2
2.3 Specifications ................................................................................. 2-2
2.4 Basic Principles .............................................................................. 2-3
2.5 Reference Information ................................................................... 2-9

3 EPON Terminal Management ....................................................................... 3-1

3.1 Definition ........................................................................................ 3-2


3.2 Features ......................................................................................... 3-2
3.3 Specifications ................................................................................. 3-2
3.4 Basic Principles .............................................................................. 3-4
3.5 Reference Information ................................................................. 3-10

4 GPON Terminal Management ...................................................................... 4-1

4.1 Definition ........................................................................................ 4-2


4.2 Features ......................................................................................... 4-2
4.3 Specifications ................................................................................. 4-2
4.4 Basic Principles .............................................................................. 4-4
4.5 Reference Information ................................................................... 4-7

5 Multicast Service Access .............................................................................. 5-1

5.1 Multicast ......................................................................................... 5-2


5.1.1 Definition ...................................................................... 5-2
5.1.2 Features ....................................................................... 5-2
5.1.3 Specifications ............................................................... 5-2
5.1.4 Basic Principles ............................................................ 5-3
5.1.5 Reference Information .................................................. 5-5
5.2 IGMP Proxy .................................................................................... 5-6
5.2.1 Definition ...................................................................... 5-6
5.2.2 Features ....................................................................... 5-6
5.2.3 Specifications ............................................................... 5-6
5.2.4 Basic Principles ............................................................ 5-7
5.2.5 Reference Information .................................................. 5-8
5.3 IGMP Snooping .............................................................................. 5-9
5.3.1 Definition ...................................................................... 5-9
5.3.2 Features ....................................................................... 5-9
5.3.3 Specifications ............................................................... 5-9
5.3.4 Basic Principles ............................................................ 5-9
5.3.5 Reference Information ................................................ 5-10
5.4 Multicast VLAN Management....................................................... 5-10
5.4.1 Definition .................................................................... 5-10
5.4.2 Features ..................................................................... 5-10
5.4.3 Specifications ............................................................. 5-10
5.4.4 Basic Principles .......................................................... 5-10
5.4.5 Reference Information ................................................ 5-11
5.5 User Management ....................................................................... 5-12
5.5.1 Definition .................................................................... 5-12
5.5.2 Features ..................................................................... 5-12
5.5.3 Specifications ............................................................. 5-12
5.5.4 Basic Principles .......................................................... 5-13
5.5.5 Reference Information ................................................ 5-15
5.6 Program Management ................................................................. 5-16
5.6.1 Definition .................................................................... 5-16
5.6.2 Features ..................................................................... 5-16
5.6.3 Specifications ............................................................. 5-16
5.6.4 Basic Principles .......................................................... 5-17
5.6.5 Reference Information ................................................ 5-17

6 VoIP Service Access .................................................................................... 6-1

6.1 VoIP ............................................................................................... 6-2


6.1.1 Definition ...................................................................... 6-2
6.1.2 Features ....................................................................... 6-2
6.1.3 Specifications ............................................................... 6-3
6.1.4 Basic Principles ............................................................ 6-5
6.1.5 Reference Information .................................................. 6-5
6.2 H.248 ............................................................................................. 6-7
6.2.1 Definition ...................................................................... 6-7
6.2.2 Features ....................................................................... 6-7
6.2.3 Specifications ............................................................... 6-7
6.2.4 Basic Principles .......................................................... 6-10
6.2.5 Reference Information ................................................ 6-11
6.3 MGCP .......................................................................................... 6-12
6.3.1 Definition .................................................................... 6-12
6.3.2 Features ..................................................................... 6-12
6.3.3 Specifications ............................................................. 6-12
6.3.4 Basic Principles .......................................................... 6-15
6.3.5 Reference Information ................................................ 6-16
6.4 SIP ............................................................................................... 6-17
6.4.1 Definition .................................................................... 6-17
6.4.2 Features ..................................................................... 6-17
6.4.3 Specifications ............................................................. 6-18
6.4.4 Basic Principles .......................................................... 6-20
6.4.5 Reference Information ................................................ 6-21

7 TDM Service Access .................................................................................... 7-1


7.1 Definition ........................................................................................ 7-2
7.2 Features ......................................................................................... 7-2
7.3 Specifications ................................................................................. 7-2
7.4 Basic Principles .............................................................................. 7-3
7.5 Reference Information ................................................................... 7-6

8 VLAN ............................................................................................................ 8-1

8.1 802.1Q VLAN ................................................................................. 8-2


8.1.1 Definition ...................................................................... 8-2
8.1.2 Features ....................................................................... 8-2
8.1.3 Specifications ............................................................... 8-3
8.1.4 Basic Principles ............................................................ 8-3
8.1.5 Reference Information .................................................. 8-4
8.2 QinQ VLAN .................................................................................... 8-5
8.2.1 Definition ...................................................................... 8-5
8.2.2 Features ....................................................................... 8-5
8.2.3 Specifications ............................................................... 8-5
8.2.4 Basic Principles ............................................................ 8-6
8.2.5 Reference Information .................................................. 8-9
8.3 VLAN Translation ......................................................................... 8-10
8.3.1 Definition .................................................................... 8-10
8.3.2 Features ..................................................................... 8-10
8.3.3 Specifications ............................................................. 8-11
8.3.4 Basic Principles .......................................................... 8-11
8.3.5 Reference Information ................................................ 8-13

9 DHCP ........................................................................................................... 9-1

9.1 DHCP Option 82 ............................................................................ 9-2


9.1.1 Definition ...................................................................... 9-2
9.1.2 Features ....................................................................... 9-2
9.1.3 Specifications ............................................................... 9-2
9.1.4 Basic Principles ............................................................ 9-3
9.1.5 Reference Information .................................................. 9-3
9.2 DHCP Option 60 ............................................................................ 9-4
9.2.1 Definition ...................................................................... 9-4
9.2.2 Features ....................................................................... 9-4
9.2.3 Specifications ............................................................... 9-4
9.2.4 Basic Principles ............................................................ 9-5
9.2.5 Reference Information .................................................. 9-5

10 QoS ............................................................................................................ 10-1

10.1 Priority ID ..................................................................................... 10-2


10.1.1 Definition .................................................................... 10-2
10.1.2 Features ..................................................................... 10-2
10.1.3 Specifications ............................................................. 10-2
10.1.4 Basic Principles .......................................................... 10-3
10.1.5 Reference Information ................................................ 10-4
10.2 Mapping between the CoS Priority and the Queue Scheduling ... 10-5
10.2.1 Definition .................................................................... 10-5
10.2.2 Features ..................................................................... 10-5
10.2.3 Specifications ............................................................. 10-5
10.2.4 Basic Principles .......................................................... 10-5
10.2.5 Reference Information ................................................ 10-6
10.3 Congestion Control ...................................................................... 10-7
10.3.1 Definition .................................................................... 10-7
10.3.2 Features ..................................................................... 10-7
10.3.3 Specifications ............................................................. 10-8
10.3.4 Basic Principles .......................................................... 10-8
10.3.5 Reference Information .............................................. 10-10
10.4 Rate Limitation Based on the Flow and the Port ........................ 10-11
10.4.1 Definition .................................................................. 10-11
10.4.2 Features ................................................................... 10-11
10.4.3 Specifications ........................................................... 10-11
10.4.4 Basic Principles ........................................................ 10-11
10.4.5 Reference Information .............................................. 10-12

11 ACL ............................................................................................................ 11-1

11.1 Definition ...................................................................................... 11-2


11.2 Features ....................................................................................... 11-2
11.3 Specifications ............................................................................... 11-2
11.4 Basic Principles ............................................................................ 11-3
11.5 Reference Information ................................................................. 11-4

12 NTP ............................................................................................................ 12-1

12.1 Definition ...................................................................................... 12-2


12.2 Features ....................................................................................... 12-2
12.3 Specifications ............................................................................... 12-2
12.4 Basic Principles ............................................................................ 12-3
12.5 Reference Information ................................................................. 12-4

13 RSTP.......................................................................................................... 13-1

13.1 Definition ...................................................................................... 13-2


13.2 Features ....................................................................................... 13-2
13.3 Specifications ............................................................................... 13-2
13.4 Basic Principles ............................................................................ 13-3
13.5 Reference Information ................................................................. 13-7

14 Ethernet Link Aggregation .......................................................................... 14-1

14.1 Definition ...................................................................................... 14-2


14.2 Features ....................................................................................... 14-2
14.3 Specifications ............................................................................... 14-3
14.4 Basic Principles ............................................................................ 14-3
14.5 Reference Information ................................................................. 14-5

15 Ethernet Port Mirroring ............................................................................... 15-1

15.1 Definition ...................................................................................... 15-2


15.2 Features ....................................................................................... 15-2
15.3 Specifications ............................................................................... 15-2
15.4 Basic Principles ............................................................................ 15-2
15.5 Reference Information ................................................................. 15-4

16 DBA ............................................................................................................ 16-1

16.1 Definition ...................................................................................... 16-2


16.2 Features ....................................................................................... 16-2
16.3 Specifications ............................................................................... 16-2
16.4 Basic Principles ............................................................................ 16-3
16.5 Reference Information ................................................................. 16-5

17 Redundancy Backup .................................................................................. 17-1

17.1 Redundancy Backup of the Core Switch Card ............................. 17-2


17.1.1 Definition .................................................................... 17-2
17.1.2 Features ..................................................................... 17-2
17.1.3 Specifications ............................................................. 17-2
17.1.4 Basic Principles .......................................................... 17-3
17.1.5 Reference Information ................................................ 17-4
17.2 Redundancy Backup of the Uplink Port ....................................... 17-5
17.2.1 Definition .................................................................... 17-5
17.2.2 Features ..................................................................... 17-5
17.2.3 Specifications ............................................................. 17-5
17.2.4 Basic Principles .......................................................... 17-6
17.2.5 Reference Information ................................................ 17-9
17.3 Redundancy Backup of the PON Port ........................................ 17-10
17.3.1 Definition .................................................................. 17-10
17.3.2 Features ................................................................... 17-10
17.3.3 Specifications ........................................................... 17-10
17.3.4 Basic Principles ........................................................ 17-10
17.3.5 Reference Information .............................................. 17-13

18 User Security .............................................................................................. 18-1

18.1 Anti MAC Spoofing ....................................................................... 18-2


18.1.1 Definition .................................................................... 18-2
18.1.2 Features ..................................................................... 18-2
18.1.3 Specifications ............................................................. 18-2
18.1.4 Basic Principles .......................................................... 18-2
18.1.5 Reference Information ................................................ 18-3
18.2 Data Encryption of an EPON User ............................................... 18-4
18.2.1 Definition .................................................................... 18-4
18.2.2 Features ..................................................................... 18-4
18.2.3 Specifications ............................................................. 18-4
18.2.4 Basic Principles .......................................................... 18-5
18.2.5 Reference Information ................................................ 18-5
18.3 Data Encryption of a GPON User ................................................ 18-7
18.3.1 Definition .................................................................... 18-7
18.3.2 Features ..................................................................... 18-7
18.3.3 Specifications ............................................................. 18-7
18.3.4 Basic Principles .......................................................... 18-7
18.3.5 Reference Information ................................................ 18-8

19 System Security ......................................................................................... 19-1

19.1 Anti-DoS Attack ............................................................................ 19-2


19.1.1 Definition .................................................................... 19-2
19.1.2 Features ..................................................................... 19-2
19.1.3 Specifications ............................................................. 19-2
19.1.4 Basic Principles .......................................................... 19-2
19.1.5 Reference Information ................................................ 19-4
19.2 MAC Address Filtering ................................................................. 19-5
19.2.1 Definition .................................................................... 19-5
19.2.2 Features ..................................................................... 19-5
19.2.3 Specifications ............................................................. 19-5
19.2.4 Basic Principles .......................................................... 19-5
19.2.5 Reference Information ................................................ 19-6
Figures

Figure 1-1 The EPON system architecture...................................................... 1-3


Figure 1-2 The EPON protocol stack architecture ........................................... 1-4
Figure 1-3 The frame structure of the data transmitted in the EPON system .. 1-5
Figure 1-4 The location of the LLID in the EPON frame .................................. 1-5
Figure 2-1 The GPON system architecture ..................................................... 2-3
Figure 2-2 The multiplex architecture of the GPON system ............................ 2-5
Figure 2-3 The GPON protocol stack architecture........................................... 2-6
Figure 2-4 The TC layer architecture............................................................... 2-7
Figure 2-5 The GPON transmission frame structure ....................................... 2-7
Figure 3-1 The OAM PDU message format and common OAM PDUs ........... 3-4
Figure 3-2 The packet format of the organization specific OAM PDU ............. 3-7
Figure 3-3 The message exchange flow ......................................................... 3-9
Figure 4-1 The frame structure of the OMCI message .................................... 4-4
Figure 4-2 The message exchange flow ......................................................... 4-5
Figure 5-1 The typical network of the multicast service ................................... 5-3
Figure 6-1 The network diagram based on the H.248 protocol ..................... 6-10
Figure 6-2 The network diagram based on the MGCP protocol .................... 6-15
Figure 6-3 The network diagram based on the SIP protocol ......................... 6-20
Figure 7-1 The TDM service network diagram ................................................ 7-3
Figure 7-2 The basic thought of the CESoP technology ................................... 7-4
Figure 7-3 The TDM service carried by GPON................................................ 7-4
Figure 8-1 The VLAN frame structure ............................................................... 8-3
Figure 8-2 The QinQ VLAN frame structure .................................................... 8-6
Figure 8-3 The service processing of the QinQ VLAN..................................... 8-7
Figure 8-4 The 1:1 VLAN translation mode ................................................... 8-11
Figure 8-5 The N:1 VLAN translation mode .................................................. 8-12
Figure 8-6 The mixed VLAN translation mode .............................................. 8-12
Figure 9-1 The principle of the DHCP Option 82 ............................................. 9-3
Figure 9-2 The principle of the DHCP Option 60 ............................................. 9-5
Figure 10-1 The principle of the queue scheduling in the SP mode ................ 10-8
Figure 10-2 The principle of the queue scheduling in the WRR mode ............ 10-9
Figure 10-3 The principle of the queue scheduling in the SP + WRR mode ... 10-9
Figure 11-1 The principle of the ACL function ................................................. 11-3
Figure 12-1 The principle of the NTP function ................................................. 12-3
Figure 13-1 The RSTP network ....................................................................... 13-5
Figure 14-1 The manual aggregation group .................................................... 14-4
Figure 14-2 The dynamic aggregation group .................................................. 14-5
Figure 15-1 The port mirroring ........................................................................ 15-3
Figure 17-1 The connection of the master and slave up links on the same uplink
card ............................................................................................. 17-6
Figure 17-2 The connection of the master and slave up links on different uplink
cards ........................................................................................... 17-7
Figure 17-3 The master / slave uplink port switching flow (recovering to the
master link automatically) ............................................................ 17-8
Figure 17-4 Principle of type B of the PON port protection............................ 17-11
Figure 17-5 Principle of type C of the PON port protection ........................... 17-11
Figure 17-6 Principle of type D of the PON port protection ........................... 17-12
Figure 19-1 The working principle of the anti-DoS attack ................................ 19-3
Tables

Table 2-1 The T-CONT types ......................................................................... 2-4


Table 3-1 Meanings of key fields in the OAM PDU ........................................ 3-5
Table 3-2 Common OAM PDUs ..................................................................... 3-5
Table 3-3 The codes of the extension operations .......................................... 3-8
Table 4-1 Key fields of the OMCI message frame and their meanings .......... 4-4
Table 10-1 The mapping relationship between the priority and the queue ..... 10-6
1 EPON Access

This chapter introduces the EPON access function, and includes the following
sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 1-1
AN5516-06 Optical Line Terminal Equipment Feature Description

1.1 Definition
EPON means the Ethernet-based PON, which is defined and standardized by IEEE.
The EPON system adopts the single-fiber bi-directional transmission mode, and its
rate is 1.25 Gbit/s (for the digital signal). Its uplink direction uses the 1310 nm
wavelength channel, and downlink direction uses the 1490 nm wavelength channel.
An EPON system is composed of the OLT, the ODN, and the ONU.

1.2 Features
Has a high transmission bandwidth and a good extensibility.

The fiber has a low loss and a wide coverage.

Its bandwidth can be allocated flexibly, and the QoS can be guaranteed.

Uses the P2MP access, so as to conserve fiber consumption.

The regeneration transmission node in the network is passive, and the


operation and maintenance cost is low.

1.3 Specifications
Supports two types of EPON interface cards: the EC4B card and the EC8B
card. The EC4B card supports four EPON ports, and the EC8B card supports
eight EPON ports.

Supports the PON port protection.

Each EPON port supports up to 64 ONUs; this means that its split ratio is 1:32,
and can reach 1:64 via the expansion operation.

An EPON port supports the maximum uplink / downlink rate of 1.25 Gbit/s.

Supports the maximum transmission distance of 20 km.

Supports the optical power detection function.

Supports the CPU / memory utilization ratio query of an EPON interface card.

Supports the query of current alarms, history alarms, instant performance, and
history performance of an EPON interface card.

1-2 Version: A
1 EPON Access

1.4 Basic Principles


System architecture

An EPON system is composed of the OLT, the ODN, and the ONU. The ODN is
mainly composed of fibers and optical splitters. The EPON system architecture is
shown in Figure 1-1.

Uplink wavelength:1310 nm

ONU

ONU Splitter
OLT

ONU Downlink wavelength:1490 nm

Subscriber Network side


side ONU

UNI interface PON interface PON interface SNI interface

Figure 1-1 The EPON system architecture

As the OLT, the AN5516-06 is connected with the ONU equipment. Between the
OLT and each ONU, one or multiple logical links (LLID) exist.

In the downlink direction from the OLT to the ONU, the Ethernet packets prefixed
with the corresponding LLIDs are transmitted in the PON. The splitter in the ODN
broadcasts the packets to each tributary; all ONUs in the tributaries can receive
these packets, and select the needed packets depending on the LLIDs.

In the uplink direction from the ONU to the OLT, various ONUs use the TDM
mechanism to share the uplink bandwidth. The OLT assigns uplink timeslots for
each ONU via the MPCP message, and assigns the bandwidth dynamically
according to the bandwidth request and the link conditions.

Version: A 1-3
AN5516-06 Optical Line Terminal Equipment Feature Description

Protocol stack architecture

For the Ethernet technology, the PON is a new medium. The IEEE 802.3 task force
defines the new physical layer, and modifies the Ethernet MAC layer and above in
the least degree, so as to support the new applications and media.

The EPON protocol stack is shown in Figure 1-2.

Figure 1-2 The EPON protocol stack architecture

The EPON physical layer is divided into the physical coding sub-layer (the PCS
sub-layer), the FEC sub-layer, the physical medium attachment sub-layer (PMA
sub-layer), and the physical medium dependent sub-layer (the PMD sub-layer).
Compared with the GE physical layer, the only difference is that the EPON physical
layer has an additional FEC sub-layer, which enables users to select the laser, the
split ratio of the splitter, and the maximum transmission distance as required. The
EPON physical layer is connected with the RS sub-layer via the Gigabit medium
independent interface (the GMII interface), and transports the reliable data for the
MAC layer. The functions of each EPON physical sub-layer are described as
follows:

1-4 Version: A
1 EPON Access

The PCS sub-layer: Is isolated at the top level of the physical layer, up linked
with the GMII interface, and down connected with the PMA sub-layer. It mainly
implements the coding conversion.

The FEC sub-layer: Is isolated between the PCS sub-layer and the PMA
sub-layer, and completes the FEC of the data.

The PMA sub-layer: Compared with the GE PMA sub-layer technologies, it has
few modifications. It mainly completes the functions such as the serial-parallel
conversion.

The PMD sub-layer: It mainly completes the O / E conversion.

Encapsulation mode

The frame structure of the data transmitted in the EPON system is shown in Figure
1-3.

Figure 1-3 The frame structure of the data transmitted in the EPON system

The EPON system transmits the data in the single-fiber bi-directional full-duplex
mode. When the OLT broadcasts to various ONUs via the optical fiber, the IEEE
802.3ah standard uses the LLID to distinguish different ONUs and ensure that only
the ONU sending the request can receive the data packets. The LLID is a two-byte
field; the OLT assigns a unique LLID No. in the network for each ONU, and this
LLID No. decides which ONU has the authorization to receive the broadcast data.
The location of the LLID is shown in Figure 1-4.

Pad
Preamble 8 DA SA Length / type Data FCS
Variable
bytes 6 bytes 6 bytes 2 bytes 46 to 1500 bytes 4 bytes
length

Reserved Reserved SPD Reserved Reserved LLID LLID CRC8

Figure 1-4 The location of the LLID in the EPON frame

Version: A 1-5
AN5516-06 Optical Line Terminal Equipment Feature Description

When ONUs burst data to OLT, the authorized ONU can send packet in the
specified timeslot and others are in idle state. The non-continuous data
transmission is called burst communication. At the OLT side, the
transmitting/receiving ends of PCS are in continuous working mode; at the ONU
side, the receiving end of the PCS receives data broadcasted from the OLT
continuously, while the transmitting end works intermittently. Therefore, the PCS
shall keep stable even upon burst transmission or receiving. The burst
synchronization and burst receiving at the OLT side is the key to realize the PCS
technology.

EPON key technologies

The dynamic bandwidth allocation

The system synchronization

Ranging and delay compensation

The RTT compensation

The burst receiving and transmitting

The multiple access protocol of the uplink channel

OAM

The OAM functions of the EPON system mainly include the following aspects:

Supports the uniform management by the network management system, and


has the functions of the performance management, fault management,
configuration management, and the security management.

Supports the authentication and configuration of an ONU.

Supports the loopback test.

1-6 Version: A
1 EPON Access

1.5 Reference Information


Standards

IEEE 802.3ah: Amendment to IEEE 802.3-2002

IEEE 802.3-2005 Local and metropolitan area networks-specific requirements


Part 3

Terminologies

None

Abbreviations

Abbreviation Meaning
EPON Ethernet Passive Optical Network
FCS Frame Check Sequence
GMII Gigabit Media Independent Interface
LLID Logical Link Identifier
MPCP Multiple point control protocol
OAM Operation, administration and maintenance
ODN Optical Distribution Network
OLT Optical Line Terminal
ONU Optical Network Unit
PCS Physical Coding Sublayer
P2MP Point to MultiPoint
PMA Physical Medium Attachment
PMD Physical Medium Dependent
RTT Round Trip Time

Version: A 1-7
2 GPON Access

This chapter introduces the GPON access function, and includes the following
sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 2-1
AN5516-06 Optical Line Terminal Equipment Feature Description

2.1 Definition
GPON means the Gigabit PON, which is defined by ITU-T G.984.x series
standards. The GPON system adopts the single-fiber bi-directional transmission
mode; its downlink rate can reach 1.25 Gbit/s or 2.5 Gbit/s, and its uplink rate can
reach 1.25 Gbit/s. A GPON system is composed of the OLT, the ODN, and the
ONU.

2.2 Features
Has a high transmission bandwidth and a good extensibility.

The fiber has a low loss and a wide coverage.

Its bandwidth can be allocated flexibly, and the QoS can be guaranteed.

Uses the GEM encapsulation mode, with high integrated transmission


efficiency.

Uses the P2MP access, so as to conserve fiber consumption.

The regeneration transmission node in the network is passive, and the


operation and maintenance cost is low.

2.3 Specifications
Supports two types of GPON interface cards: the GC4B card and the GC8B
card. The GC4B card supports four GPON ports, and the GC8B card supports
eight GPON ports.

Supports the PON port protection.

Each GPON port supports up to 64 ONUs; this means that its split ratio is 1:64.

A GPON port supports the maximum downlink rate of 2.5 Gbit/s and the
maximum uplink rate of 1.25 Gbit/s.

Supports the maximum transmission distance of 20 km.

Supports the optical power detection function.

Supports the CPU / memory utilization ratio query of a GPON interface card.

2-2 Version: A
2 GPON Access

Supports the query of current alarms, history alarms, instant performance, and
history performance of a GPON interface card.

2.4 Basic Principles


System architecture

A GPON system is composed of the OLT, the ODN, and the ONU. The ODN is
mainly composed of fibers and optical splitters. The GPON system architecture is
shown in Figure 2-1.

Uplink wavelength: 1310 nm

ONU

ONU Splitter
OLT

ONU Downlink wavelength: 1490 nm

Subscriber
Network side
side ONU

UNI interface PON interface PON interface SNI interface

Figure 2-1 The GPON system architecture

As the OLT, the AN5516-06 is connected with the ONU equipment. The downlink
packets from the OLT are broadcasted via the splitter in the ODN, and each ONU
on the tributary only receives its dedicated packets.

In the uplink direction from the ONU to the OLT, various ONUs use the TDM
mechanism to share the uplink bandwidth. The OLT allocates uplink timeslots for
each ONU via the MPCP message, and allocates the bandwidth dynamically
according to the bandwidth request and the link conditions.

Version: A 2-3
AN5516-06 Optical Line Terminal Equipment Feature Description

T-CONT

GPON uses T-CONTs to implement service convergence. A T-CONT is the basic


control unit for the uplink service streams in the GPON system. The GPON system
defines four bandwidth priorities as follows: fixed, assured, not-assured, and
best-effort.

Depending on the bandwidth combination used by the T-CONT, the T-CONT can
be classified as five types. Table 2-1 lists the correspondence relationships
between the T-CONT types and bandwidth types and their sensitivities to the delay.

Table 2-1 The T-CONT types

Bandwidth Sensitivity T-CONT Type


Type to the Delay Type 1 Type 2 Type 3 Type 4 Type 5
Fixed True True False False False True
Assured False False True True False True
Not-assured False False False True False True
Best-effort False False False False True True

In the GPON system, one ONU can be allocated with multiple T-CONTs; these
T-CONTs are independent of each other, and each T-CONT is identified by an
Alloc-ID. Each T-CONT is composed of one or multiple GEM ports, each GEM port
carries one type of service stream, and a GEM port is identified by a unique Port-ID.
A GEM port identifies the service channel between the OLT and the ONU, and this
channel carries the service stream. The multiplex architecture of the GPON system
is shown in Figure 2-2.

2-4 Version: A
2 GPON Access

Figure 2-2 The multiplex architecture of the GPON system

Protocol stack architecture

The protocol stack model of the GPON system is shown in Figure 2-3, and is
mainly composed of the PMD layer and the GTC layer. The GTC layer includes two
sub-layers: the GTC framing sub-layer and the TC adaption sub-layer. The GPON
equipment generally uses the GEM frame encapsulation mode, and the GTC layer
in the GEM mode can provide three types of interfaces for the client layer: the ATM
client interface, the GEM client interface, and the ONU management and control
interface (OMCI).

Version: A 2-5
AN5516-06 Optical Line Terminal Equipment Feature Description

Figure 2-3 The GPON protocol stack architecture

The PMD layer

The GPON PMD layer corresponds to the optical transmission interface


between the OLT and the ONU (also called the PON interface); the maximum
transmission distance and maximum split ratio of the GPON system depend
on the parameter values in the PMD layer.

The TC layer

The TC layer (also called the GTC layer) is the core layer of the GPON, and
mainly performs the two key functions as follows: the MAC of the uplink
service stream and the registration of an ONU. The protocol stack of the TC
layer is shown in Figure 2-4, and the OLT controls the ONUs via the OMCI.

2-6 Version: A
2 GPON Access

Figure 2-4 The TC layer architecture

The GTC layer includes two sub-layers: the GTC framing sub-layer and the
GTC adaption sub-layer. The GTC framing sub-layer performs the following
three functions: the multiplex / demultiplex function, the frame header
generation and decoding function, and the internal routing function.

The GTC adaptive sub-layer provides three TC adapters: the ATM TC


adapter, the GEM TC adapter, and the OMCI adapter. The ATM / GEM TC
adapter generates the PDUs of various ATM / GEM blocks from the GTC
framing sub-layer, and maps these PDUs into the corresponding blocks.

Encapsulation mode

In the GPON TC layer, the GEM frame structure is specially defined to encapsulate
the services except for the ATM service, including the TDM and Ethernet data
services. The GEM frame structure is shown in Figure 2-5.

Figure 2-5 The GPON transmission frame structure

Version: A 2-7
AN5516-06 Optical Line Terminal Equipment Feature Description

The data transmitted in the GPON system use the GEM encapsulation mode; the
data type information of the valid payload in the GEM frame is displayed in the
GEM frame header, so as to provide the GEM control frame for transferring the
management and control information from the OLT.

GPON key technologies

The generic framing protocol

The dynamic bandwidth allocation

The system synchronization

Ranging and delay compensation

The RTT compensation

The burst receiving and transmitting

The MPCP protocol

The OMCI protocol

OAM

The OAM functions of the GPON system include the following aspects:

Supports the uniform management by the network management system, and


has the functions of the performance management, fault management,
configuration management, and the security management.

Supports the interconnection of the OMCI protocol.

Supports the authentication and configuration of an ONU.

Supports the loopback test function.

2-8 Version: A
2 GPON Access

2.5 Reference Information


Standards

ITU-T G.984.1 General characteristics for Gigabit-capable Passive Optical


Networks (GPON)

ITU-T G.984.2 Gigabit-capable Passive Optical Networks (GPON):Physical


Media Dependent (PMD) layer specification

ITU-T G.984.3 Gigabit-capable Passive Optical Networks


(GPON):Transmission convergence layer

ITU-T G.984.4 Gigabit-capable Passive Optical Networks(GPON): ONT


management and control interface specification

Terminologies

None

Abbreviations

Abbreviation Meaning
ATM Asynchronous Transfer Mode
DBA Dynamic Bandwidth Assignment
GEM G-PON Encapsulation Method
GPON Gigabit-capable Passive Optical Network
LLID Logical Link Identifier
MPCP Multiple point control protocol
OAM Operation, administration and maintenance
ODN Optical Distribution Network
OLT Optical Line Terminal
OMCI ONT Management Control Interface
ONU Optical Network Unit
P2MP Point to Multiple Point
PLOAM Physical Layer Operations, Administration and Maintenance
PMD Physical Medium Dependent
RTT Round Trip Time
T-CONT Transmission Container

Version: A 2-9
3 EPON Terminal Management

This chapter introduces the EPON terminal management function, and includes the
following sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 3-1
AN5516-06 Optical Line Terminal Equipment Feature Description

3.1 Definition
The EPON terminal management function refers to the following operation: An
EPON OLT performs the service configuration and management of the EPON ONU
using the OAM extension protocol. Users can manage and configure the ONU via
the GUI or CLI network management system at the OLT side.

3.2 Features
Implements the automatic delivering of services

An EPON OLT supports the off-line configuration of an EPON ONU and the
configuration recovery after the EPON ONU is on line. The EPON ONU does
not need to save the configuration by itself.

Implements the visual maintenance of the terminal equipment

The ONU acts as the remote equipment of the OLT; in the network
management system, users can manage the OLT and the ONU as one
network entity.

Supports advanced management standards

The OAM extension protocols are used to manage the ONU, the ONU ports,
and the port properties.

3.3 Specifications
Supports multiple ONU types, such as the SFU and box-shape MDU (including
the LAN type MDU and the xDSL type MDU), the plug-in MDU, and the HGU
type ONU.

The EC48 card supports the access of up to 4096 EPON ONUs. The EC8B
card supports the access of up to 8192 EPON ONUs.

Supports the EPON ONU automatic discovery and detection function, and can
report the SN and MAC address of an ONU to the network management
system automatically.

3-2 Version: A
3 EPON Terminal Management

Supports the following authentication modes for the legality of an EPON ONU:
the physical-address-based authentication, the logical-ID-based
authentication, the logical-ID-and-password-based authentication, the mixed
authentication 1 (the logical ID + the physical address), the mixed
authentication 2 (the logical ID + the password + the physical address).

Supports the pre-authorization, the pre-configuration, and the batch


configuration of EPON ONUs.

Supports the restriction on the number of MAC addresses accessed via the FE
port of an EPON ONU.

Supports the restriction on the number of multicast groups that an FE of an


EPON ONU can join.

Supports the port binding function of an EPON ONU, so as to prevent the


access of illegal users.

Supports the uplink / downlink port rate restriction function of an EPON ONU.

Supports the classification, marking, queuing, and scheduling of the uplink


service streams on an EPON ONU.

Supports the management of the ports status and the auto-negotiation on an


EPON ONU.

Supports the flow control of the FE port on an EPON ONU.

Supports the online query on the multicast information of an EPON ONU, and
the multicast information includes the online multicast groups, the group
members, the status, etc.

Can control the forwarding of multicast packets by an EPON ONU.

Supports the uploading, batch upgrade, and automatic upgrade of the EPON
ONU software.

Supports the automatic rollback function during the upgrade of the EPON ONU
software.

Supports the exporting of the configuration file of an ONU.

Supports setting the MAC address aging time of an ONU.

Supports the management on the FEC function of the PON port of an EPON
ONU.

Version: A 3-3
AN5516-06 Optical Line Terminal Equipment Feature Description

Supports the collection of the user side interface performance parameters of


an EPON ONU and the optical power monitor and detection of an ONU optical
module.

3.4 Basic Principles


OAM protocol

The Ethernet OAM is a tool to monitor the faults in the network. It runs at the data
link layer, and uses the regular interactivities of the OAM PDU between equipment
sets to report the network status. It enables the network administrator to manage
the network more validly.

The OAM protocol defines the message format of the interactivities between the
OLT and the ONU, and provides a logical communication channel.

Figure 3-1 The OAM PDU message format and common OAM PDUs

3-4 Version: A
3 EPON Terminal Management

Table 3-1 Meanings of key fields in the OAM PDU

Field Meaning
The destination MAC address, and its value is the slow
protocol multicast addresses: 0x0180-C200-0002. The
feature of the slow protocol message is that it cannot be
Dest addr
forwarded by the bridge; so the OAM message cannot be
forwarded crossing multiple hops no matter the system
has the OAM function or the OAM function is activated.
The source MAC address, and its value is the MAC
address of the Tx port (if this address does not exist, use
Source addr
the bridge MAC address of this equipment). It should be a
unicast MAC address.
Type The protocol type, and its value is 0x8809.
Subtype The protocol sub-type, and its value is 0x03.
The Flag domain, and includes the status information of
Flags
the OAM entity.
The message code, and each value indicates a certain
Code
OAM PDU type.

Table 3-2 Common OAM PDUs

Code Value Message Type Purpose


Exchanges the status information (including the local
Information
0x00 information TLV, the remote information TLV, and the user
OAM PDU
defined information TLV) between the OLT and the ONU.
Event
Raises the alarms for the faults that occur in the OLT and
0x01 notification OAM
ONU links.
PDU
Is used to test the link quality and isolate the link faults.
Loopback
This message includes the enabling / disabling
0x04 control OAM
information, used to enable / disable the remote loopback
PDU
function.

Hereinafter we introduce the operation mechanism of the OAM:

Version: A 3-5
AN5516-06 Optical Line Terminal Equipment Feature Description

The establishment process of an OAM connection is also called the discovery


phase. In this phase, the OLT discovers the remote ONU, and establishes the
stable session with it. After the OAM connection is established, the information
OAM PDU will be sent periodically between the OLT and the ONU to test
whether the connection is normal. If a certain party does not receive the
information OAM PDU from the opposite end in the connection timeout interval,
the system will regard that the OAM connection has failed.

The event notification OAM PDU is exchanged between the ONU and the OLT
to monitor the link. When the equipment at one end finds a common link event,
it will send the event notification OAM PDU to the opposite end; then the
administrator can understand the network status dynamically by observing the
alarms reported in the network management system.

When the fault or unavailability of the equipment causes the traffic interruption,
the faulty end will deliver the fault information (the urgent link event type) to the
opposite end via the Flag domain in the information OAM PDU; then the
administrator can understand the link status dynamically by observing the
alarms reported in the network management system and handle the
corresponding faults in time.

The remote loopback is described as follows: In the active mode, when the
ONU (OLT) sends a packet except for the OAM PDU, the opposite end will
loop back the packet to the local end directly after receiving it. This function
can be used to identify the fault in the link and test the link quality. The network
administrator can determine the link performance (including the packet loss
rate, the delay, the jitter, etc.) by observing the returning condition of the
non-OAM-PDU packet.

Extended OAM

The extended OAM extends the types of OAM PDUs based on the Ethernet OAM
technology. Via the extended OAM PDUs, the request and response of the
connection can be completed between the OLT and the ONU; in addition, the OLT
can perform the remote management of the ONU.

The extended OAM defines a new kind of TLV field in the information OAM PDU:
the organization specific information TLV; the information OAM PDU including this
field is called the extended information OAM PDU.

The organization specific information field includes the following contents:

The local OUI address: Identifies the manufacturer of the local equipment set.

3-6 Version: A
3 EPON Terminal Management

The supported OUI address: Identifies the equipment that can be connected
with the local OLT or ONU and its manufacturer.

The OAM version No.: Identifies the OAM protocol version used by the local
OLT or ONU.

The organization specific OAM PDU is a newly-added OAM PDU. It uses 0xFE as
the identifier type field; when users manage the ONU at the OLT end, the extended
OAM can encapsulate various operation and confirmation information into the Data
field of the organization specific OAM PDU for transmission.

Figure 3-2 The packet format of the organization specific OAM PDU

The Data field is composed of the following parts:

OUI: the OUI address of the Tx equipment.

Ext.Opcode: the extension operation code. The extended OAM uses a


dedicated code to identify the corresponding operation of the packet.

Payload: Includes the code and contents to be configured corresponding to the


function that needs to be configured or queried by the user.

Pad: the padding field.

Version: A 3-7
AN5516-06 Optical Line Terminal Equipment Feature Description

Table 3-3 The codes of the extension operations

Code Operation Type Remark


Extended
The OLT uses it to query the extension features of the
0x01 Variable
ONU.
Request
Extended
The ONU uses it to return its extension features to the
0x02 Variable
OLT.
Response
The OLT uses it to configure the extension features /
0x03 Set Request
operations of the ONU.
The ONU uses it to return is acknowledgement for the
0x04 Set Response
extension features / operation configuration to the OLT.
ONU Is used to perform the ONU authentication based on the
0x05
Authentication logical ID.
Software
0x06 Is used for the ONU to download the software.
Download
0x09 Churning Is used to exchange the key related to Triple-Churning.
0x0A DBA It is used to query and configure the DBA function.
Reserved for
Other Value Is reserved.
future use

Hereinafter we introduce the operation mechanism of the extended OAM:

1. The discovery of the extended OAM

Before performing the data transmission with the ONU equipment, the OLT
needs to use the extended OAM discovery function to determine whether it
can communicate with the opposite end equipment normally.

First the OLT and the ONU need to complete the standard OAM discovery,
and determine whether the link status is normal via the standard OAM. After
determining that the link is normal, the OLT and the ONU will exchange the
extended information OAM PDU to inform the other party on the OUI address,
the OUI address that can be supported and the OAM version No. If the OUI
addresses and OAM versions at the two ends are both in the range that is
supported by the opposite end, the extended OAM discovery will end normally,
and the data transmission will start; otherwise the communication cannot be
performed normally.

3-8 Version: A
3 EPON Terminal Management

2. The management of the extended OAM

After the discovery of the extended OAM is completed, the OLT can configure
the ONU in the remote mode via the organization specific OAM PDU.

Message exchange mechanism

The terminal configuration management information of the AN5516-06 is delivered


to the EPON ONU through the OAM channel; the status and alarm information of
the ONU is reported to the AN116-06B through the OAM channel.

Figure 3-3 The message exchange flow

The steps to establish the OAM channel between the AN5516-06 and the EPON
ONU are described as follows:

1. After the EPON ONU is powered on, it exchanges the OAM message with the
AN5516-06 to complete the registration.

2. The AN5516-06 delivers the terminal configuration and management


information to the ONU through the OAM channel.

3. The ONU reports the status and alarm information to the AN5516-06 through
the OAM channel.

Version: A 3-9
AN5516-06 Optical Line Terminal Equipment Feature Description

3.5 Reference Information


Standards

IEEE 802.3-2005

Terminologies

None

Abbreviations

Abbreviation Meaning
EPON Ethernet Passive Optical Network
HGU Home Gateway Unit
MDU Multiple Dwelling Unit
OAM Operations, Administration and Maintenance
OLT Optical Line Termination
ONU Optical Network Unit
OUI Organizationally Unique Identifier
PDU Protocol Data Units
SFU Single Family Unit
TLV Type Length Value

3-10 Version: A
4 GPON Terminal Management

This chapter introduces the GPON terminal management function, and includes
the following sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 4-1
AN5516-06 Optical Line Terminal Equipment Feature Description

4.1 Definition
GPON terminal management refers to configuration and management of GPON
optical network units (ONUs) on the GPON optical line terminal (OLT) through the
ONT Management and Control Interface (OMCI).

4.2 Features
Implements the automatic delivering of services

A GPON OLT supports the off-line configuration of a GPON ONU and the
configuration recovery after the GPON ONU is on line. The GPON ONU does
not need to save the configuration by itself.

Implements the visual maintenance of the terminal equipment

The ONU acts as the remote equipment of the OLT; in the network
management system, users can manage the OLT and the ONU as one
network entity.

Supports advanced management standards

The OMCI protocols are used to manage the VLAN configuration and the port
properties on the ONU.

4.3 Specifications
Supports multiple ONU types, such as the SFU and box-shape MDU (including
the LAN type MDU and the xDSL type MDU), the plug-in MDU, and the HGU
type ONU.

The GC4B card supports the access of up to 4096 GPON ONUs. The GC8B
card supports the access of up to 8192 GPON ONUs.

Supports the GPON ONU automatic discovery and detection function, and can
report the SN and MAC address of an ONU to the network management
system automatically.

4-2 Version: A
4 GPON Terminal Management

Supports the following authentication modes for the legality of a GPON ONU:
the physical-address-based authentication, the password-based
authentication, the physical-address-and-password-based authentication.

Supports the pre-authorization, the pre-configuration, and the batch


configuration of GPON ONUs.

Supports the configuration and management of the ONU T-CONT.

Supports the configuration of the mapping from the ONU traffic to the GEM
port.

Supports the configuration of the mapping from the ONU GEM port to the
T-CONT.

Supports the restriction on the number of MAC addresses accessed via the FE
port of a GPON ONU.

Supports the restriction on the number of multicast groups that an FE of a


GPON ONU can join.

Supports the port binding function of a GPON ONU, so as to prevent the


access of illegal users.

Supports the uplink / downlink port rate restriction function of a GPON ONU.

Supports the classification, identification, queue, and scheduling of the uplink


service streams on a GPON ONU.

Supports the management of the ports status and the auto-negotiation on a


GPON ONU.

Supports the flow control of the Ethernet port on a GPON ONU.

Supports the online query on the multicast information of a GPON ONU, and
the multicast information includes the online multicast groups, the group
members, the status, etc.

Can control the forwarding of multicast packets by a GPON ONU.

Supports the uploading and batch upgrade of the GPON ONU software.

Supports the automatic rollback function during the upgrade of the GPON
ONU software.

Supports the exporting of the configuration file of an ONU.

Supports copying the configuration of an ONU.

Supports setting the MAC address aging time of an ONU.

Version: A 4-3
AN5516-06 Optical Line Terminal Equipment Feature Description

Supports the management on the FEC function of the PON port of a GPON
ONU.

Supports the collection of the user side interface performance parameters of a


GON ONU and the optical power monitor and detection of an ONU optical
module.

4.4 Basic Principles


OMCI protocol

The OMCI protocol is mainly defined by ITU-T G.984.4; in addition, it uses the
definition architecture on the OMCI in BPON, such as ITU-T G.983.2. The OMCI
protocol defines the format of the message interaction between the OLT and the
ONU, and provides a logical communication channel.

In the GEM mode, the OMCI message is encapsulate in the GEM packet directly.

Figure 4-1 The frame structure of the OMCI message

Table 4-1 Key fields of the OMCI message frame and their meanings

Field Meaning
PLI identifies the length of payload following the header. Port-ID identifies
the port ID. PTI identifies the content type and corresponding processing
GEM Header
mode of the payload.HEC performs the error detection and correction
function of the header.
The transaction correlation identifier is used to correlate a request message
Transaction
and its response message. An OLT selects an transaction correlation
Correlation
identifier randomly for a request message, and the response message has
Identifier
the transaction correlation identifier of the message to which it responds.
Message Type The message type mainly includes set, get, etc.
Device
For the GPON equipment, the equipment ID is 0x0A.
Identifier

4-4 Version: A
4 GPON Terminal Management

Field Meaning
The two most significant valid bytes of the message identifier are used to
Message identify the destination managed entity of the designated operation in the
Identifier message type field, and the two least significant valid bytes of the message
identifier are used to identify the status of the destination managed entity.
Message The message contents. The OMCI frame is padded according to the
Contents message type of the managed entity.
OMCI Trailer Is used to pad the check code.

The OLT controls the ONU using the OMCI protocol. The OMCI protocol allows the
following operations of the OLT:

Sets up and tears down the connection with the ONU;

Manages the UNI on the ONU;

Delivers the request of the configuration and performance statistics


information.

Reports events (such as the link fault) to the network administrator


automatically.

Message exchange mechanism

The terminal configuration management information of the AN5516-06 is delivered


to the GPON ONU through the OMCI channel; the status and alarm information of
the ONU is reported to the AN5516-06 through the OMCI channel.

ONU OLT
PLOAM
information

Configuration
and
management
information

Status and
alarm
information

Figure 4-2 The message exchange flow

Version: A 4-5
AN5516-06 Optical Line Terminal Equipment Feature Description

The steps to establish the OMCI channel between the AN5516-06 and the GPON
ONU are described as follows:

1. After the GPON ONU is powered on, it exchanges the PLOAM (Physical Layer
OAM) message with the AN5516-06 to complete the register operation.

2. The AN5516-06 obtains the OMCI capability of the ONU via the PLOAM
message. When the ONU also supports the OMCI protocol, an OMCI channel
can be established between the AN5516-06 and the ONU.

3. The AN5516-06 delivers the terminal configuration and management


information to the ONU through the OMCI channel.

4. The ONU reports the status and alarm information to the AN5516-06 through
the OMCI channel.

4-6 Version: A
4 GPON Terminal Management

4.5 Reference Information


Standards

ITU-T G.983.2

ITU-T G.984.1

ITU-T G.984.2

ITU-T G.984.3

ITU-T G.984.4

Terminologies

Terminology Description
The OMCI is an OAM service, and provides the standard methods for
OMCI discovering the ONU capability and configuring / managing the ONU data. It
is defined by ITU-TG.984.4.
The T-CONT manages the uplink bandwidth allocation of the PON in the
T-CONT transmission and convergence layer, and is mainly used to increase the
uplink bandwidth usage efficiencies of the PON.

Abbreviations

Abbreviation Meaning
BPON Broadband Passive Optical Network
GEM GPON Encapsulation Method
GPON Gigabit-capable Passive Optical Network
HGU Home Gateway Unit
MDU Multiple Dwelling Unit
OMCI Optical Network Termination Management and Control Interface
OLT Optical Line Termination
ONU Optical Network Unit
SFU Single Family Unit
T-CONT Transmission Containers

Version: A 4-7
5 Multicast Service Access

This chapter introduces the multicast service access function, and includes the
following sections:

Multicast

IGMP Proxy

IGMP Snooping

Multicast VLAN management

User management

Program management

Version: A 5-1
AN5516-06 Optical Line Terminal Equipment Feature Description

5.1 Multicast

5.1.1 Definition

The multicast refers to the following operation: The multicast source sends the
information to a certain subset of all the network nodes. The source host only
sends one data packet, and multiple receivers can receive the same copy of this
packet.

5.1.2 Features

Adopts the single-point transmitting and multipoint receiving, so as to


implement the point-to-multipoint data transport effectively.

Saves the network bandwidth significantly and reduces the network load
effectively.

Enables some new value-added services, including live online radio, TV,
remote medical care, remote education, and real-time video conferencing.

5.1.3 Specifications

Supports the IGMP V2 / V3.

Supports the IGMP Proxy.

Supports the IGMP Snooping.

Supports the tree and ring network.

Supports the RPF.

Supports the controllable multicast, including the multicast VLAN management,


the user management, the program management, etc.

5-2 Version: A
5 Multicast Service Access

5.1.4 Basic Principles

Typical network

Uses the SCB + IGMP mode to deliver the multicast service and the typical network
of the multicast service is shown in Figure 5-1.

Set top
TV
box ONU

Splitter
IPTV server

Set top ONU IGMP proxy / snooping


TV
box running
Delivering in the SCB +
IGMP mode
IGMP V2 / V3 IGMP proxy /
running snooping running

Figure 5-1 The typical network of the multicast service

Multicast IP address

The multicast IP address is used to identify an IP multicast group. The IANA


allocates the D-type address space to the IP multicast service, and the value of an
IP address ranges from 224.0.0.0 to 239.255.255.255.

Version: A 5-3
AN5516-06 Optical Line Terminal Equipment Feature Description

Multicast protocols

The protocol between the host and the route, namely the multicast
membership management protocol, such as the IGMP. The IGMP establishes
and maintains the group membership information of the directly-connected
network segment on a certain router.

The multicast routing protocol between various routers includes the


intra-domain multicast routing protocol and the inter-domain multicast routing
protocol.

The intra-domain multicast routing protocol includes the PIM-SM, the


PIM-DM, the DVMRP, etc. The intra-domain multicast routing protocol
forms the multicast distribution tree to forward the multicast packets using
a certain multicast route algorithm, according to the multicast group
member relationship information maintained by the IGMP.

The inter-domain multicast routing protocol includes the MBGP, the MSDP,
etc. The inter-domain multicast routing protocol sends the information on
the routes which have the multicast capability and the information on the
multicast source between various autonomous areas, so as to forward the
multicast data between different domains.

IGMP protocol messages

The IGMP report message: This message is sent to the multicast router by the
multicast application terminal, and is used to request for joining a certain
multicast group or responding to the IGMP query message.

The IGMP general query message: This message is sent to multicast group
members by the multicast router, and is used to query which multicast groups
have members.

The IGMP group-specific query message: This message is sent to multicast


group members by the multicast router, and is used to query whether an
designated multicast group has members. When the multicast router receives
an IGMP group-specific query message, it only sends the query message to
the IP multicast group to be queried.

5-4 Version: A
5 Multicast Service Access

The IGMP leave message: This message is sent to the multicast router by a
certain multicast group member router, and is used to notify the multicast
router that the multicast application terminal has left a certain multicast group.
When the multicast router receives the leave message of a certain multicast
group, it will send an IGMP group-specific query message of this group to the
port which receives the leave message for querying whether other members of
this multicast group still exist under this port. At the same time, the system will
start up a response query timer. If the system does not receive the report
message of this multicast group in the timeout interval of this timer, this port
will be deleted from the corresponding multicast group.

5.1.5 Reference Information

Standards

RFC 2236

RFC 3376

Terminologies

None

Abbreviations

Abbreviation Meaning
DVMRP Distance Vector Multicast Routing Protocol
IANA Internet Assigned Numbers Authority
IGMP Internet Group Management Protocol
MBGP Multiprotocol BGP
MSDP Multicast Source Discovery Protocol
PIM-DM Protocol Independent Multicast-Dense Mode
PIM-SM Protocol Independent Multicast-Sparse Mode
RPF Reverse Path Forwarding
SCB Single Copy Broadcast
VLAN Virtual Local Area Network

Version: A 5-5
AN5516-06 Optical Line Terminal Equipment Feature Description

5.2 IGMP Proxy

5.2.1 Definition

The IGMP proxy refers to the following operation: The equipment acts as a
multicast proxy between the multicast router and the multicast users. For the
multicast router, the equipment can be regarded as a multicast user; for the
multicast users, the equipment can be regarded as a multicast router.

5.2.2 Features

The equipment manages the group member status actively.

Can reduce the load of the uplink equipment effectively.

5.2.3 Specifications

The HSWA card and PON interface card can implement the proxy of two
levels.

Supports the IGMP V2 / V3 Proxy.

Implements the query function to support the general and group-specific query
mechanism.

Implements the report function to respond to the query from the upper-level
router.

Supports the IGMP host function, and sends the join and leave messages to
the upper-level multicast router.

Supports the tree and ring networks.

5-6 Version: A
5 Multicast Service Access

5.2.4 Basic Principles

As an IGMP proxy, the AN5516-06 intercepts all IGMP requests sent by the
multicast application terminal and processes them; then forwards them to the
upper-level multicast router and establishes the correspondence relationships
between the group members and the PON interfaces (this is called the multicast
forwarding table). At the same time, the AN5516-06 forwards the multicast packets
to various PON interfaces according to the multicast forwarding table. The
AN5516-06 emulates the multicast application terminal on the uplink port, and
emulates the multicast router on the PON interface.

When the equipment works in the IGMP proxy mode, the flow for a user to view the
multicast program is described as follows:

1. The multicast application terminal sends an IGMP report message to


subscribe to the object program.

2. After the AN5516-06 receives this report, the operations are described as
follows: If the multicast service stream of the object channel has not been sent
to the uplink port of the equipment (meaning that no users under the
equipment are viewing this program), the equipment will subscribe to this
channel to the multicast router and establish the corresponding multicast
forwarding table; after the multicast service stream of the object channel is
sent to the uplink port of the equipment, the equipment will forward it to the
user PON interface and the corresponding ONU. If the multicast service
stream of the object channel has been sent to the uplink port of the equipment
but has not been sent to the user PON interface (meaning that a certain user
under other PON interfaces of the equipment is viewing this program), the
equipment will forward it to the user PON interface and the corresponding
ONU. If the multicast service stream of the object channel has been sent to the
user PON interface (meaning that a certain user under this PON interface is
viewing this program), the equipment will map it to the user ONU directly.

3. The AN5516-06 sends the IGMP general query messages to all online users
periodically. If the AN5516-06 does not receive the response messages of any
multicast user in the set interval, it will delete this multicast group from the
multicast forwarding table; at the same time, the AN5516-06 will send a leave
message to the uplink multicast router for notifying the uplink multicast router
to stop sending the service stream of this multicast program. If the AN5516-06
receives the response messages of a multicast user in the set interval, it will
continue to send the service stream of this multicast program.

Version: A 5-7
AN5516-06 Optical Line Terminal Equipment Feature Description

4. When the user is to leave a certain multicast channel to which it has


subscribed, the multicast application terminal will send an IGMP leave
message to the AN5516-06, and the AN5516-06 will send a designated
number of IGMP group-specific query messages o this PON interface. The
AN5516-06 determines whether to stop forwarding this multicast service
stream depending on whether it has received the IGMP report message from
the user PON interface in the set timeout interval. If another user is viewing
this channel now, the AN5516-06 will maintain forwarding the multicast service
stream of this channel in the downlink direction; if no other users exist under
this PON interface after the object user leaves this channel, the AN5516-06
will stop forwarding the multicast service stream of this channel in the downlink
direction.

5.2.5 Reference Information

None

5-8 Version: A
5 Multicast Service Access

5.3 IGMP Snooping

5.3.1 Definition

The IGMP snooping refers to the following operation: The equipment snoops the
IGMP protocol packet between the multicast router and the multicast terminal user,
establishes the multicast member relationship table, and forwards the multicast
service according to the multicast member relationship. This is to ensure that a
group member can receive the correct multicast service, and other hosts cannot.

5.3.2 Features

The IGMP snooping influences the equipment load at least.

The protocol processing load of the uplink equipment is relatively heavy.

5.3.3 Specifications

The HSWA card and the PON interface card both work in the snooping mode.

Supports the IGMP V2 / V3 snooping.

Implements the query function to support the general and group-specific query
mechanism.

Supports the tree and ring networks.

5.3.4 Basic Principles

Via snooping the IGMP member report message sent to the multicast router by the
application terminal, the AN5516-06 forms the correspondence relationship
between the group members and the switch interfaces (namely the multicast
forwarding table). The AN5516-06 forwards the received downlink multicast
packets to the corresponding interface of the group member according to the
multicast forwarding table. The IGMP snooping can solve the problem of packets
flooding of layer 2, but it requires that the AN5516-06 can extract the information of
layer 3; in addition, the AN5516-06 needs to monitor and unscramble all multicast
packets.

Version: A 5-9
AN5516-06 Optical Line Terminal Equipment Feature Description

5.3.5 Reference Information

None

5.4 Multicast VLAN Management

5.4.1 Definition

For the multicast service, one or multiple dedicated multicast VLANs are used to
isolate it from other services. One multicast VLAN corresponds to one multicast
channel or one channel group (a channel group means the set of multicast
channels under the management of a united entity). One multicast channel can
belong to only one dedicated multicast VLAN.

5.4.2 Features

It increases the manageability of the multicast VLAN number and the multicast
VLAN translation.

5.4.3 Specifications

The equipment supports seven multicast VLANs.

One multicast VLAN can include up to 1024 multicast programs.

The equipment supports the translation function of the multicast VLAN.

The equipment supports to manage and identify program sources and users
based on the multicast VLAN.

5.4.4 Basic Principles

In the IGMP proxy or IGMP snooping working mode, the system uses the following
flow to manage multicast VLANs:

5-10 Version: A
5 Multicast Service Access

In the uplink direction: If an uplink IGMP Join packet or IGMP Leave packet is
untagged, the system will tag it with a legal multicast VLAN ID; if an uplink
IGMP Join packet or IGMP Leave packet is tagged, the system will translate its
VLAN ID into a legal multicast VLAN ID that can be identified by the
AN5516-06.

In the downlink direction: The system will translate the legal downlink multicast
data stream and IGMP Query packet VLAN ID that can be identified by the
AN5516-06 into a legal VLAN ID that can be identified by the ONU.

In the controllable working mode, the system uses the following flow to manage
multicast VLANs:

In the uplink direction: If an uplink IGMP Join packet or IGMP Leave packet is
untagged, the system will tag it with a port No. to perform the port user
identification; if an uplink IGMP Join packet or IGMP Leave packet is tagged,
the system will translate its VLAN ID into a port No. to perform the port user
identification.

In the downlink direction: The system will translate the legal downlink multicast
data stream and IGMP Query packet VLAN ID that can be identified by the
AN5516-06 into a legal VLAN ID that can be identified by the ONU.

5.4.5 Reference Information

None

Version: A 5-11
AN5516-06 Optical Line Terminal Equipment Feature Description

5.5 User Management

5.5.1 Definition

The user management refers to the following operation: Authorizes multicast users
and validates the legality of a user to prevent illegal users from viewing the
controlled multicast program.

5.5.2 Features

It increases the manageability of the legality and authorization of a user.

5.5.3 Specifications

A user can view up to 1024 multicast programs and preview up to 128


multicast programs.

The equipment supports limiting the authorization for a user to view / preview
programs. If the user is only allowed to preview a certain program, the
equipment supports to limit the preview times, the preview time, the preview
interval, etc.

The equipment supports forcing an designated multicast user to leave.

The equipment supports setting the leave mode of a multicast user. The leave
mode includes the fast leave and the normal leave.

The equipment supports the information statistics of multicast users, including


the view times, the average view time, the maximum view time, and the total
view time of each user.

The equipment supports the hierarchical management of the online group


information, including the uplink port online group information, the HSWA card
online group information, the PON interface card online group information, and
the ONU online group information.

5-12 Version: A
5 Multicast Service Access

5.5.4 Basic Principles

User authorization

When a multicast application terminal (such as a set top box) applies for a certain
multicast channel, it will send the IGMP report message in the uplink direction. After
receiving the uplink IGMP report message, the ONU tags it with a VLAN tag to
identify the port, and then transmits this IGMP report message to the AN5516-06
transparently.

After receiving the uplink IGMP report message, the AN5516-06 queries the view
authorization to this channel and relevant parameters of this port user, according to
the port ID, the multicast IP address and source IP address of the report message
(the source IP address is only applicable in IGMP V3, optional).

If the AN5516-06 finds that the view authorization to this channel of this port
user is allowed, it will notify the ONU to add one entry in the multicast
forwarding table via an extended multicast control OAM message. This entry
indicates that the view authorization to this channel of this port user is
allowed.

If the AN5516-06 finds that the view authorization to this channel of this port
user is forbidden, it performs no other operations, and the ONU performs no
other operations either. If the multicast application terminal (such as a set top
box) does not receive any IGMP message and multicast service stream in a
certain interval, it will stop applying for this channel.

If the AN5516-06 finds that the view authorization to this channel of this port
user is preview, it will notify the ONU to add one temporary entry in the
multicast forwarding table via an extended multicast control OAM message. At
the same time, the AN5516-06 starts up a timer and a counter to control the
preview time, preview counts, and preview interval of this user. The ONU
forwards the multicast service stream from the AN5516-06 to the
corresponding user port according to the temporary entry, and strips the tag.
After the AN5516-06 preview timer or counter exceeds its threshold, the
AN5516-06 will immediately notify the ONU to delete the temporary entry from
the multicast forwarding table via an extended multicast control OAM message,
and reset the timer and the counter. At the same time, the AN5516-06 will
determine whether to stop forwarding the object multicast service stream to
this PON interface according to whether other users in the same PON have
ordered multicast service stream, and perform the relevant operations.

Version: A 5-13
AN5516-06 Optical Line Terminal Equipment Feature Description

Fast leave

In the fast leave mode, the ONU will immediately stop forwarding the multicast
service stream of the object group to the user port after receiving the IGMP Leave
message (deletes the corresponding entry from the multicast authorization control
table of this ONU); at the same time, the ONU will tag the IGMP Leave message
with the VLAN tag identifying the Rx port of the Leave message, and then transmit
it to the AN5516-06. After receiving this IGMP Leave message, the AN5516-06
records the user port leaving multicast group event of this ONU, and determines
whether other users in the same PON interface are applying for this multicast
service according to the AN5516-06 local controllable multicast record information.

If other users in the same PON interface are applying for this multicast service, the
equipment will keep forwarding this multicast service to the PON interface; If no
other users in the same PON interface are applying for this multicast service, the
equipment will stop forwarding this multicast service to the PON interface.

Normal leave

In the normal leave mode, the ONU will start the last member query mechanism
after receiving the IGMP leave message; this means to send the group-specific
query message to the UNI port having received the leave message and then start
the response timer. If the ONU does not receive the IGMP report message from the
multicast application terminal in group-specific query interval, the ONU will
determine that no other members of this multicast exist under this port. So the ONU
will delete this port from the multicast group and stop forwarding the corresponding
multicast service stream to this port; then the ONU tags the IGMP leave message
with the VLAN tag identifying the user identity, and transmit it to the AN5516-06
transparently. If the ONU receives the IGMP report message corresponding to this
multicast group from this port in the group-specific query timeout interval, the ONU
will keep the original multicast forwarding table and continue to forward this
multicast service stream to this port; at the same time, the ONU will discard the
IGMP leave message.

5-14 Version: A
5 Multicast Service Access

5.5.5 Reference Information

Standards

None

Terminologies

None

Abbreviations

Abbreviation Meaning
OAM Operation, Administration and Maintenance

Version: A 5-15
AN5516-06 Optical Line Terminal Equipment Feature Description

5.6 Program Management

5.6.1 Definition

The program management refers to the management on the multicast program


properties, and the managed multicast program properties include the bandwidth,
the preview parameters, the multicast VLAN, the leave delay, etc.

5.6.2 Features

It increases the manageability of the quantity, bandwidth, and preview parameters


of the multicast programs.

5.6.3 Specifications

The equipment supports 4096 multicast programs.

Each PON interface supports 1024 multicast programs.

Each FTTH ONU supports 32 multicast programs; each FTTB ONU supports
1024 multicast programs.

The equipment supports the pre-joining of a multicast program.

The equipment supports the bandwidth setting of a multicast program.

The equipment supports the preview parameter setting of a multicast program.

The equipment supports the information statistics of multicast programs,


including the view times, the average view time, the maximum view time, and
the total view time of each multicast program.

The equipment supports the hierarchical management of the online group


information, including the uplink port online group information, the HSWA card
online group information, the PON interface card online group information, and
the ONU online group information.

5-16 Version: A
5 Multicast Service Access

5.6.4 Basic Principles

Pre-joining of a multicast program

The pre-joining of a multicast program is described as follows: In case no users


view a multicast program, the AN5516-06 sends the IGMP report message to the
multicast router and delivers this multicast program to the uplink port in advance;
when needing to view this multicast program, a user can view it rapidly.

Multicast program bandwidth

By setting the port multicast service bandwidth and the multicast program
bandwidth, the system controls the joining of a new multicast program. If the
bandwidth occupied by the online programs exceeds the specified bandwidth, a
new program cannot join.

Multicast program preview

The multicast program preview means that a user does not have the authorization
to view a total multicast program, and the operator sets the preview times, the
preview time, and the preview interval for the user to enable the user to have basic
knowledge about this multicast program. According to the planning of the operator,
the user needs to pay an additional fee for viewing the total multicast program.

5.6.5 Reference Information

Standards

None

Terminologies

None

Abbreviations

Abbreviation Meaning
FTTB Fiber To The Building
FTTH Fiber To The Home

Version: A 5-17
6 VoIP Service Access

This chapter introduces the VoIP service access function, and includes the
following sections:

VoIP

H.248

MGCP

SIP

Version: A 6-1
AN5516-06 Optical Line Terminal Equipment Feature Description

6.1 VoIP

6.1.1 Definition

The VoIP is a technology based on the IP telephone, and supports corresponding


value-added services. The main advantage of the VoIP is that it can provide more
and better services than the POTS using Internet and the global IP interconnection
widely. The VoIP can transport the voice, fax, video, and data services with a lower
cost over the IP network, and the services supported by it include the unified
messaging, the virtual telephone, the virtual voice / fax mailbox, the directory
assistance service, the Internet call center, the Internet call management, the video
conferencing, the E-Commerce, the fax store-and-forward, and the
store-and-forward of other information types.

6.1.2 Features

Supports the integration of multiple services, and can implement the high
integration of services such as the voice, data, and fax services.

Provides multiple network security functions (such as the access list, the
record of illegal access operations, the authorization, and the accounting) and
advanced QoS functions (such as the RSVP, the weighted fair queuing, the
WRED, and the IP priority). Can perform powerful QoS guarantees that enable
the IP telephone to provide the call quality almost like that of the PSTN
telephone.

Has an excellent configurability, and various modules can be configured as


required to reduce the network construction cost greatly. The modular design
of the modules allows excellent extensibility and upgradability. These features
ensure profits of the enterprise investment.

6-2 Version: A
6 VoIP Service Access

6.1.3 Specifications

6.1.3.1 VoIP Services Supported when the AN5516-06 is Used

Together with the Softswitch Equipment

When used together with the softswitch equipment, the AN5516-06 supports the
following VoIP services:

The access of up to 6k users at the same time.

The IP telephone access of a POTS user.

The calling number identification presentation and restriction.

The call waiting.

The three party service.

The alarm service.

The call forwarding (unconditional, busy and no answer).

The immediate hotline.

The blind transfer and attended transfer.

The outgoing call blocking.

The distinctive ring.

The fax service based on the T.30 / T.38 protocol.

The pulse accounting and polarity reversal accounting.

The IP CENTREX service.

6.1.3.2 VoIP Functions Provided by the AN5516-06

The AN5516-06 provides the following VoIP functions:

Supports the ITU-T H.248, MGCP, and SIP protocols.

Performs the subscriber line test function.

The call processing capability is 25k BHCA.

Version: A 6-3
AN5516-06 Optical Line Terminal Equipment Feature Description

The call completing ratio is larger than 99.999%.

Supports the voice coding modes defined by ITU-T G.711a / G.711u / G.723 /
G.726 / G.729.

Supports the silence compression and comfort noise generator functions.

Supports the echo suppression function.

Supports the multi-MGC list.

Supports the 802.1Q VLAN and priority configuration of each voice channel.

6.1.3.3 Equipment Performance

The equipment performance is described as follows:

The dynamic switching time of the voice coding is less than 60 ms.

The equipment does not generate the voice interruption and jitter.

The objective estimation of the voice service

When the network condition is good, the average PSQM is less than 1.5.

When the network condition is bad (packet loss rate = 1%, jitter = 20 ms,
delay = 100 ms), the average PSQM is less than 1.8.

When the network condition is the worst (packet loss rate = 5%, jitter = 60
ms, delay = 400 ms), the average PSQM is less than 2.0.

The subjective estimation of the voice service

When the network condition is good, the MOS is larger than 4.0.

When the network condition is bad (packet loss rate = 1%, jitter = 20 ms,
delay = 100 ms), the MOS is larger than 3.5.

When the network condition is the worst (packet loss rate = 5%, jitter = 60
ms, delay = 400 ms), the MOS is larger than 3.0.

The coding rate

For G.711, the coding rate is 64 kbit/s.

For G.729a, the coding rate is less than 18 kbit/s.

For G.723.1, the coding rate is less than 18 kbit/s under G.723.1 (5.3) or
15 kbit/s under G.723.1 (6.3).

6-4 Version: A
6 VoIP Service Access

The delay parameters (loopback delay)

The VoIP delay includes the coding / decoding delay, the Rx end input buffer
delay, and the internal query delay.

When the G.729a coding is used, the loopback delay is less than 150 ms.

When the G.723.1 coding is used, the loopback delay is less than 200 ms.

6.1.4 Basic Principles

The PSTN telephone network uses the circuit switched network to transmit the
voice service, and the required transmission bandwidth is 64 kbit/s; the VoIP uses
the IP (Internet / Intranet) data network based on the router / packet switching for
the transmission. Because a data packet is transferred using the store-forward
mechanism in Internet and does not occupy an independent circuit, and the voice
signals are compressed greatly, the IP telephone only needs to occupy a
bandwidth of 8 kbit/s to 10 kbit/s. Internet uses the standard TCP / IP protocol to
implement the communication and data exchange between various computers.

The TCP / IP protocol is in charge of sending the IP packets needing transmission


to the network in packets and queues. Each packet includes the address and data
reassembly information to assure that the data are secure and the data packets are
switched correctly. The IP telephone uses Internet as the main medium of the voice
transmission. First, the voice signal is transmitted to the IP telephone gateway via
the PSTN telephone network; then the IP telephone gateway converts and
compresses the voice signal into the digital signal and sends it to Internet; then the
digital signal is transmitted to opposite gateway via the IP network, the opposite
gateway converts the digital signal into the analog signal and transmits the analog
signal to the local PSTN telephone network, and the local PSTN telephone network
sends the voice signal to the called party.

6.1.5 Reference Information

Standards

ITU-T H.320

ITU-T H.321

ITU-T H.322

Version: A 6-5
AN5516-06 Optical Line Terminal Equipment Feature Description

ITU-T H.323

ITU-T H.324

ITU-T H.248

IETF MGCP

IETF SIP

Terminologies

Terminology Description
The PSTN (Public Switched Telephone Network) means the traditional
PSTN switched telephone network, and is the most widely used telephone network
in the world.
The gateway is a type of network unit, and is used to implement the
interconnection between the networks with different architectures. In the
Gateway
NGN architecture, the NGN is interconnected with other networks via some
gateways.

Abbreviations

Abbreviation Meaning
BHCA Busy Hour Call Attempts
ISDN Integrated Service Digital Network
IP Internet Protocol
MGC Media Gateway Controller
MOS Mean Opinion Score
POTS Plain Old Telephone Service
PSQM Perceptual Speech Quality Measure
QoS Quality of Service
RSVP Resource Reservation Protocol
TCAP Transaction Capabilities Application Part
TCP Transmission Control Protocol
VoIP Voice over IP
VPN Virtual Private Network
WRED Weighted Random Early Detection

6-6 Version: A
6 VoIP Service Access

6.2 H.248

6.2.1 Definition

The H.248 / Megaco protocol is a media gateway control protocol defined by IETF
and ITU-T. It is a non-peer-to-peer protocol, and is used in the communication
between the media gateway controller and the media gateway. Its main functions
are described as follows: Establishes a good service bearing and connection model,
and separates the call and the bearing connection; manages various service
gateways, including the trunk gateway, the access gateway, and the register
gateway, and implements the service interconnection between the packet based
network and the PSTN.

6.2.2 Features

The H.248 protocol supports access technologies of multiple types, and


supports a mobile terminal.

The H.248 protocol supports the network application and protocol extension
with a large scale, and has a powerful flexibility.

6.2.3 Specifications

6.2.3.1 H.248 Services Supported when the AN5516-06 is Used

Together with the Softswitch Equipment

When used together with the softswitch equipment, the AN5516-06 supports the
following H.248 voice services:

The access of up to 6k users at the same time.

The IP telephone access of a POTS user.

The calling number identification presentation and restriction.

The call waiting.

The three party service.

Version: A 6-7
AN5516-06 Optical Line Terminal Equipment Feature Description

The alarm service.

The call forwarding (unconditional, busy and no answer).

The immediate hotline.

The outgoing call blocking.

The distinctive ring.

The fax service based on the T.30 / T.38 protocol.

The pulse accounting and polarity reversal accounting.

The IP CENTREX service.

6.2.3.2 H.248 Voice Functions Provided by the AN5516-06

The AN5516-06 provides the following H.248 voice functions:

Performs the subscriber line test function.

The call processing capability is 25k BHCA.

The call completing ratio is larger than 99.999%.

Supports the voice coding modes defined by ITU-T G.711a / G.711u / G.723 /
G.726 / G.729.

Supports the silence compression and comfort noise generator functions.

Supports the echo suppression function.

Supports the multi-MGC list.

Supports the 802.1Q VLAN and priority configuration of each voice channel.

6.2.3.3 Equipment Performance

The equipment performance is described as follows:

The dynamic switching time of the voice coding is less than 60 ms.

The equipment does not generate the voice interruption and jitter.

The objective estimation of the voice service

When the network condition is good, the average PSQM is less than 1.5.

6-8 Version: A
6 VoIP Service Access

When the network condition is bad (packet loss rate = 1%, jitter = 20 ms,
delay = 100 ms), the average PSQM is less than 1.8.

When the network condition is the worst (packet loss rate = 5%, jitter = 60
ms, delay = 400 ms), the average PSQM is less than 2.0.

The subjective estimation of the voice service

When the network condition is good, the MOS is larger than 4.0.

When the network condition is bad (packet loss rate = 1%, jitter = 20 ms,
delay = 100 ms), the MOS is larger than 3.5.

When the network condition is the worst (packet loss rate = 5%, jitter = 60
ms, delay = 400 ms), the MOS is larger than 3.0.

The coding rate

For G.711, the coding rate is 64 kbit/s.

For G.729a, the coding rate is less than 18 kbit/s.

For G.723.1, the coding rate is less than 18 kbit/s under G.723.1 (5.3) or
15 kbit/s under G.723.1 (6.3).

The delay parameters (loopback delay)

The VoIP delay includes the coding / decoding delay, the Rx end input buffer
delay, and the internal query delay.

When the G.729a coding is used, the loopback delay is less than 150 ms.

When the G.723.1 coding is used, the loopback delay is less than 200 ms.

Version: A 6-9
AN5516-06 Optical Line Terminal Equipment Feature Description

6.2.4 Basic Principles

The AN5516-06 voice network principle based on the H.248 protocol is shown in
Figure 6-1.

Figure 6-1 The network diagram based on the H.248 protocol

As Figure 6-1 shows, the AN5516-06 system uses the H.248 protocol to perform
the signaling interaction with the softswitch and complete the call control; the ONU
uses the standard voice coding technology to convert the user voice signal into the
IP packet, and then the OLT sends the IP packet to the IP network for transmission.
The purpose is to deliver the VoIP service to users using the AN5516-06 system.

The H.248 protocol entity mainly includes the MG and the MGC.

MG

The MG processes the media stream, and sends the media stream to the IP
network in packets. The ONU in the network diagram acts as the MG.

MGC

The MGC is in charge of the registration and management of the MG


resources, and controls the call. The softswitch in the network diagram acts as
the MGC.

6-10 Version: A
6 VoIP Service Access

6.2.5 Reference Information

Terminologies

Terminology Description
The softswitch is the core equipment for the evolution from the circuit
switched network to the packet network, and is also one of the key
equipment types for the NGN. It is independent of the bottom bearing
protocol, and mainly performs the following functions: call control, media
Softswitch
gateway access control, resource allocation, protocol processing, routing,
authentication, and accounting. In addition, it can provide all existing
services that circuit switching can support and multiple third party services
for users.
The gateway is a type of network unit, and is used to implement the
interconnection between the networks with different architectures. In the
Gateway
NGN architecture, the NGN is interconnected with other networks via some
gateways.

Abbreviations

Abbreviation Meaning
BHCA Busy Hour Call Attempts
IP Internet Protocol
MG Media Gateway
MGC Media Gateway Controller
MOS Mean Opinion Score
POTS Plain Old Telephone Service
PSQM Perceptual Speech Quality Measure
RTP Real-time Transport Protocol

Version: A 6-11
AN5516-06 Optical Line Terminal Equipment Feature Description

6.3 MGCP

6.3.1 Definition

The MGCP protocol defined by IETF decomposes the gateway into several
functional sub-modules: the call control entity (MGC) and the media
processing entity (MG), and appoints the standard protocols for the
communication between these sub-modules. The MGCP protocol plays an
important role in the VoIP solution.

The main functions of the MGCP protocol are described as follows:


Establishes a good service bearing and connection model, and separates the
call and the bearing connection; manages various service gateways (currently
mainly are access gateways), including the trunk gateway, the access gateway,
and the register gateway, and implements the service interconnection between
the packet based network, the packet user access network, and the PSTN.

6.3.2 Features

The MGCP is coded in the text mode, and has a simple architecture. So it is
easy to understand, and can be developed and maintained easily.

The MGCP can be well integrated with the SS7 network, and provides more
controls and turnover for the call processing.

6.3.3 Specifications

6.3.3.1 MGCP Services Supported when the AN5516-06 is Used

Together with the Softswitch Equipment

When used together with the softswitch equipment, the AN5516-06 supports the
following MGCP voice services:

The access of up to 6k users at the same time.

The IP telephone access of a POTS user.

The calling number identification presentation and restriction.

6-12 Version: A
6 VoIP Service Access

The call waiting.

The three party service.

The alarm service.

The call forwarding (unconditional, busy and no answer).

The immediate hotline.

Outgoing call blocking.

The distinctive ring.

The fax service based on the T.30 / T.38 protocol.

The pulse accounting and polarity reversal accounting.

The IP CENTREX service.

6.3.3.2 MGCP Voice Functions Provided by the AN5516-06

The AN5516-06 provides the following MGCP voice functions:

Performs the subscriber line test function.

The call processing capability is 25k BHCA.

The call completing ratio is larger than 99.999%.

Supports the voice coding modes defined by ITU-T G.711a / G.711u / G.723 /
G.726 / G.729.

Supports the silence compression and comfort noise generator functions.

Supports the echo suppression function.

Supports the multi-MGC list.

Supports the 802.1Q VLAN and priority configuration of each voice channel.

6.3.3.3 Equipment Performance

The equipment performance is described as follows:

The dynamic switching time of the voice coding is less than 60 ms.

The equipment does not generate the voice interruption and jitter.

Version: A 6-13
AN5516-06 Optical Line Terminal Equipment Feature Description

The objective estimation of the voice service

When the network condition is good, the average PSQM is less than 1.5.

When the network condition is bad (packet loss rate = 1%, jitter = 20 ms,
delay = 100 ms), the average PSQM is less than 1.8.

When the network condition is the worst (packet loss rate = 5%, jitter = 60
ms, delay = 400 ms), the average PSQM is less than 2.0.

The subjective estimation of the voice service

When the network condition is good, the MOS is larger than 4.0.

When the network condition is bad (packet loss rate = 1%, jitter = 20 ms,
delay = 100 ms), the MOS is larger than 3.5.

When the network condition is the worst (packet loss rate = 5%, jitter = 60
ms, delay = 400 ms), the MOS is larger than 3.0.

The coding rate

For G.711, the coding rate is 64 kbit/s.

For G.729a, the coding rate is less than 18 kbit/s.

For G.723.1, the coding rate is less than 18 kbit/s under G.723.1 (5.3) or
15 kbit/s under G.723.1 (6.3).

The delay parameters (loopback delay)

The VoIP delay includes the coding / decoding delay, the Rx end input buffer
delay, and the internal query delay.

When the G.729a coding is used, the loopback delay is less than 150 ms.

When the G.723.1 coding is used, the loopback delay is less than 200 ms.

6-14 Version: A
6 VoIP Service Access

6.3.4 Basic Principles

The AN5516-06 voice network principle based on the MGCP protocol is shown in
Figure 6-2.

Figure 6-2 The network diagram based on the MGCP protocol

As Figure 6-2 shows, the AN5516-06 system uses the MGCP protocol to perform
the signaling interaction with the softswitch and complete the call control; the ONU
uses the standard voice coding technology to convert the user voice signal into the
IP packet, and then the OLT sends the IP packet to the IP network for transmission.
The purpose is to deliver the VoIP service to users using the AN5516-06 system.

The MGCP protocol entity mainly includes the MG and the MGC.

MG

The MG translates the media format in a certain network into the media format
complying with another network. For example, the MG can complete the
translation between the bearer channel of the circuit switched network and the
media stream of the packet network. The MG can process multiple types of
media data, and can complete the signaling function under the control of the
media gateway controller. The ONU in the network diagram (shown in Figure
6-2) acts as the MG.

MGC

The MGC controls the call status related to the media channel connection
control. The softswitch in the network diagram (shown in Figure 6-2) acts as
the MGC.

Version: A 6-15
AN5516-06 Optical Line Terminal Equipment Feature Description

6.3.5 Reference Information

Terminologies

Terminology Description
The softswitch is the core equipment for the evolution from the circuit
switched network to the packet network, and is also one of the key
equipment types for the NGN. It is independent of the bottom bearing
protocol, and mainly performs the following functions: call control, media
Softswitch
gateway access control, resource allocation, protocol processing, routing,
authentication, and accounting. In addition, it can provide all existing
services that circuit switching can support and multiple third party services
for users.
The gateway is a type of network unit, and is used to implement the
interconnection between the networks with different architectures. In the
Gateway
NGN architecture, the NGN is interconnected with other networks via some
gateways.

Abbreviations

Abbreviation Meaning
BHCA Busy Hour Call Attempts
IP Internet Protocol
MG Media Gateway
MGC Media Gateway Controller
MGCP Media Gateway Control Protocol
MOS Mean Opinion Score
POTS Plain Old Telephone Service
PSQM Perceptual Speech Quality Measure
RTP Real-time Transport Protocol

6-16 Version: A
6 VoIP Service Access

6.4 SIP

6.4.1 Definition

The SIP is a text-coding-based IP telephone / multimedia conference protocol


defined by IETF. It is used to establish, modify, and terminate a multimedia session.

The SIP protocol can be used to initiate a session, and also can be used to invite a
member to join the session which has been established in other modes. The
members joining a session can communicate with each other in one of the
following modes: multicast, unicast interconnection, or the combination of multicast,
unicast interconnection. The SIP protocol transparently support the name mapping
and redirection services, and enables the ISDN, intelligent service, and personal
mobile service.

6.4.2 Features

Minimal state.

Lower-layer-protocol neutral.

Text-based.

Its robustness is perfect.

Its extensibility is good.

It can support the IN service easily.

Version: A 6-17
AN5516-06 Optical Line Terminal Equipment Feature Description

6.4.3 Specifications

6.4.3.1 SIP Services Supported when the AN5516-06 is Used

Together with the Softswitch Equipment

When used together with the softswitch equipment, the AN5516-06 supports the
following SIP voice services:

The access of up to 6k users at the same time.

The IP telephone access of a POTS user.

The calling number identification presentation and restriction.

The call waiting.

The three party service.

The alarm clock service.

The call forwarding (unconditional, busy and no answer).

The blind transfer and attended transfer.

The outgoing call blocking.

The distinctive ring.

The fax service based on the T.30 / T.38 protocol.

The pulse accounting and polarity reversal accounting.

The IP CENTREX service.

6.4.3.2 SIP Voice Functions Provided by the AN5516-06

The AN5516-06 provides the following SIP voice functions:

Performs the subscriber line test function.

The call processing capability is 25k BHCA.

The call completing ratio is larger than 99.999%.

6-18 Version: A
6 VoIP Service Access

Supports the voice coding modes defined by ITU-T G.711a / G.711u / G.723 /
G.726 / G.729.

Supports the silence compression and comfort noise generator functions.

Supports the echo suppression function.

Supports the 802.1Q VLAN and priority configuration of each voice channel.

6.4.3.3 Equipment Performance

The equipment performance is described as follows:

The dynamic switching time of the voice coding is less than 60 ms.

The equipment does not generate the voice interruption and jitter.

The objective estimation of the voice service

When the network condition is good, the average PSQM is less than 1.5.

When the network condition is bad (packet loss rate = 1%, jitter = 20 ms,
delay = 100 ms), the average PSQM is less than 1.8.

When the network condition is the worst (packet loss rate = 5%, jitter = 60
ms, delay = 400 ms), the average PSQM is less than 2.0.

The subjective estimation of the voice service

When the network condition is good, the MOS is larger than 4.0.

When the network condition is bad (packet loss rate = 1%, jitter = 20 ms,
delay = 100 ms), the MOS is larger than 3.5.

When the network condition is the worst (packet loss rate = 5%, jitter = 60
ms, delay = 400 ms), the MOS is larger than 3.0.

The coding rate

For G.711, the coding rate is 64 kbit/s.

For G.729a, the coding rate is less than 18 kbit/s.

For G.723.1, the coding rate is less than 18 kbit/s under G.723.1 (5.3) or
15 kbit/s under G.723.1 (6.3).

The delay parameters (loopback delay)

The VoIP delay includes the coding / decoding delay, the Rx end input buffer
delay, and the internal query delay.

Version: A 6-19
AN5516-06 Optical Line Terminal Equipment Feature Description

When the G.729a coding is used, the loopback delay is less than 150 ms.

When the G.723.1 coding is used, the loopback delay is less than 200 ms.

6.4.4 Basic Principles

The AN5516-06 voice network principle based on the SIP protocol is shown in
Figure 6-3.

Figure 6-3 The network diagram based on the SIP protocol

As Figure 6-3 shows, the AN5516-06 system uses the SIP protocol to perform the
signaling interaction with the softswitch and IMS and complete the call control; the
ONU uses the standard voice coding technology to convert the user voice signal
into the IP packet, and then the OLT sends the IP packet to the IP network for
transmission. The purpose is to deliver the VoIP service to users using the
AN5516-06 system.

The SIP protocol entity mainly includes the proxy server, the register server, and
the user agent.

Proxy server

As a logical network entity, the proxy server forwards the request or response
in behalf of the client. It has three conditions: stateless, stateful, and call
stateful, and can attempt to forward the request to multiple addresses in the
branch and circle modes. Its main functions include routing function,
authentication, accounting monitor, call control, service providing, etc. The
softswitch in the network diagram (shown in Figure 6-3) acts as the proxy
server.

6-20 Version: A
6 VoIP Service Access

Register server

The register server receives the register request. It saves the address
mapping relationship (in the register request) in the database so that the
following relevant call processes can use the address mapping relationship; in
addition, the register server can perform the location service. The softswitch in
the network diagram (shown in Figure 6-3) acts as the register server.

User agent

A logical entity initiating or receiving the request is called the user agent. The
user port of the ONU in the network diagram (shown in Figure 6-3) acts as the
user agent.

6.4.5 Reference Information

Terminologies

Terminology Description
The softswitch is the core equipment for the evolution from the circuit
switched network to the packet network, and is also one of the key
equipment types for the NGN. It is independent of the bottom bearing
protocol, and mainly performs the following functions: call control, media
Softswitch
gateway access control, resource allocation, protocol processing, routing,
authentication, and accounting. In addition, it can provide all existing
services that circuit switching can support and multiple third party services
for users.
The gateway is a type of network unit, and is used to implement the
interconnection between the networks with different architectures. In the
Gateway
NGN architecture, the NGN is interconnected with other networks via some
gateways.

Abbreviations

Abbreviation Meaning
BHCA Busy Hour Call Attempts
IP Internet Protocol
ISDN Integrated Service Digital Network
ISUP ISDN User Part
MOS Mean Opinion Score
POTS Plain Old Telephone Service

Version: A 6-21
AN5516-06 Optical Line Terminal Equipment Feature Description

Abbreviation Meaning
PSQM Perceptual Speech Quality Measure
RTP Real-time Transport Protocol
SIP Session Initiation Protocol

6-22 Version: A
7 TDM Service Access

This chapter introduces the TDM service access function, and includes the
following sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 7-1
AN5516-06 Optical Line Terminal Equipment Feature Description

7.1 Definition
In the GPON system, the TDM service is accessed as follows: The E1 data
streams are encapsulated using the MEF-8 protocol into Ethernet frames, and then
into GEM frames for transport over the GPON network.

7.2 Features
The AN5516-06 can carry services effectively. It uses the CESoP over GEM mode
to implement the TDM service, so the current switch & transmission system and
client end TDM access equipment do not need replacement, and the traditional
circuit switched service can be carried on the packet switched network.

7.3 Specifications
Supports two types of TDM interface cards: The CE1B card and the C155A
card. The CE1B card provide 32 E1 interfaces, and the C155A card provides
two (1+1 backup) STM-1 interfaces.

Supports two system timing modes: the asynchronous timing mode and the
synchronous timing mode.

Supports multiple clock types, including the oscillator, external clock 1,


external clock 2, the clock extracted from E1 line, and the clock extracted from
the STM-1 optical line.

Supports multiple clock recovery modes, including the self adaptive clock, the
enhanced clock, the differential clock, and the loopback clock.

7-2 Version: A
7 TDM Service Access

7.4 Basic Principles


TDM service network

Figure 7-1 The TDM service network diagram

The TDM service network in the CESoP over GEM mode is shown in Figure 7-1.

The TDM services of E1 private line users and mobile users can be accessed via
the ONU E1 interface; the ONU transmits the TDM services to the OLT side, and
then the OLT identifies and forwards the TDM services, and transmits them to the
upper level SDH network.

Version: A 7-3
AN5516-06 Optical Line Terminal Equipment Feature Description

CESoP

At its most basic, the CESoP technology tunnels TDM services across a managed
PSN (packet switched network). TDM traffic is packetized using a IP packet for
each E1 frame, put into a packet payload and transported across the PON. The
payload is then received at the OLT and converted to TDM, aggregated, and
connected to the PSTN (public switched telephone network). For the TDM service,
the CESoP supports the transparent transmission, so the CESoP has a perfect
compatibility with the traditional telecommunication network; this means that all
traditional services, such as protocols, signaling, data services, voice services, and
video services, can use the CESoP technology intactly. In addition, the relevant
equipment needs no modification; so the telecommunication operator can utilize
the current resources best by applying the traditional TDM service over the IP
network.

Figure 7-2 The basic thought of the CESoP technology

CESoP over GEM

The CESoP over GEM mode is described as follows: Uses the CESoP technology to
map the TDM service into the packet frame (such as the Ethernet frame), and then
encapsulates the packet frame that encapsulates the TDM service into the GEM
frame. In general, it uses the two-layer encapsulation mode to carry the TDM
service.

Figure 7-3 The TDM service carried by GPON

7-4 Version: A
7 TDM Service Access

The TDM service is down linked to the OLT, and the TDM frame is received from
the E1 line by the TDM service card; then the TDM service card adapts the TDM
frame into the Ethernet frame via the CES chip, and sends the Ethernet frame to
the core switch card of the system via the GE bus; then the core switch card
forwards the Ethernet frame to the GPON service card, and the GPON MAC chip of
the GPON service card encapsulates the Ethernet frame into the GEM frame, and
sends the GEM frame to the remote end ONU supporting the CES function. The
GPON MAC of this ONU receives the Ethernet frame from the GEM frame, and
sends the Ethernet frame to the CES chip to convert the Ethernet frame to the TDM
frame; then the TDM frame is transmitted to the downlink TDM equipment. The
uplink direction follows a reverse process.

Version: A 7-5
AN5516-06 Optical Line Terminal Equipment Feature Description

7.5 Reference Information


Standards

IETF RFC3985 (2005)

IETF RFC4197 (2005)

IETF RFC4553 (2006)

ITU-T G.703

ITU-T G.812

ITU-T G.813

ITU-T G.823

ITU-T G.824

ITU-T G.8261

ITU-T G.984.1

ITU-T G.984.2

ITU-T G.984.3

ITU-T G.984.4

Telcordia GR-1244-CORE / GR-253

7-6 Version: A
7 TDM Service Access

Terminologies

Terminology Description
The SDH is a series of hierarchical digital transmission architecture, and is
SDH used to standardize the transmission of the payload in the physical
transmission network.
The circuit switch is described as follows: An actual electronic circuit
(physical line) is maintained the communication process; after this electronic
Circuit switch
circuit is established, the user occupies the fixed transmission bandwidth
from the Tx end to the Rx end until this connection terminates.
The packet switch is described as follows: Divides the user data into
multiple equal-length segments, and each segment is called a data
segment. Each data segment and the header ahead of the data segment
(the header is composed of the additional control information) form a
Packet switch
packet. The header is used to identify the destination address of the
corresponding packet; the switch forwards each packet to the destination
address depending on its address ID. This process is called the packet
switch.
The frame is a kind of data transmission unit defined by IEEE 802, and is
used to transmit the protocol data unit between MAC service users. The
Frame
frame has the following three types: the untagged frame, the VLAN-tagged
frame, and the priority-tagged frame.

Abbreviations

Abbreviation Meaning
GEM GPON Encapsulation Mode
GPON Gigabit-capable Passive Optical Network
OLT Optical Line Terminal
ONU Optical Network Unit
PSTN Public Switched Telephone Network
SDH Synchronous Digital Hierarchy
TDM Time Division Multiplexing
CESoP Circuit Emulation Services over Packet

Version: A 7-7
8 VLAN

This chapter introduces the VLAN function, and includes the following sections:

802.1Q VLAN

QinQ VLAN

VLAN translation

Version: A 8-1
AN5516-06 Optical Line Terminal Equipment Feature Description

8.1 802.1Q VLAN

8.1.1 Definition

The virtual local area network (VLAN) is a technology used to form virtual
workgroups by grouping the devices of a LAN logically. The IEEE issued draft IEEE
802.1Q in 1999, aiming at standardizing VLAN implementations. The 802.1Q
standard perfects the architecture of the VLAN, and unifies the tag format of
different manufacturers for frame tagging.

8.1.2 Features

Controls the broadcast storm

A VLAN is a logical broadcast domain. The data packets from a certain VLAN
member are only forwarded to the other members of the same VLAN. Through
the establishment of a VLAN, the system isolates the broadcast and reduces
the broadcast range, so as to control the generation of the broadcast storm.

Increases the security of the entire network

Supports multiple VLAN setting modes, and can control the user access
authorization and the size of a logical network segment, so as to set various
user groups to different VLANs and increase the overall performance and
security of the interactive network.

Implements the simple and visual network management

A VLAN can set network users at different physical locations in the same
logical network segment according to the functional divisions, the object
groups, or the applications. Without modifying the physical connection of the
network, users can move a workstation as required from workgroup to
workgroup, or from subnet to subnet. This can reduce the burden of the
network management and maintenance greatly, and save the network
maintenance cost.

8-2 Version: A
8 VLAN

8.1.3 Specifications

The AN5516-06 supports up to 4k VLANs.

Supports the VLAN setting based on the IEEE 802.1Q standard.

8.1.4 Basic Principles

VLAN frame structure

Figure 8-1 The VLAN frame structure

An 802.1Q tag header includes the TPID (two bytes) and the TCI (two bytes):

TPID: The TPID domain can be modified. In Ethernet, the TPID value of a
VLAN tag is usually set to 0x8100; the TPID values may vary with the network
or the equipment provider.

TCI

Priority: Is 3-bit. Its values range from 0 to 7, meaning the priority from low
to high.

CFI: Is 1-bit (0 or 1). 0 indicates the canonical format, and 1 indicates the
non-canonical format.

Version: A 8-3
AN5516-06 Optical Line Terminal Equipment Feature Description

VLAN ID: Is 12-bit. It means the ID of a VLAN, with the value ranging from
0 to 4095.

VLAN setting

The AN5516-06 uses the VLAN setting mode based on the IEEE 802.1Q standard.
In this mode, the system adds the 802.1Q tag to the Ethernet frame, and identifies
VLANs using the VID. When a certain data frame passes through the equipment,
the equipment will identify the VLAN that it belongs to according to the VID
information of the tag in the Ethernet frame; if no tags exist in the frame, the
equipment will identify the VLAN that it belongs to according to the default VID
information of the port that the frame passes through.

8.1.5 Reference Information

Standards

IEEE 802.1Q

Terminologies

None

Abbreviations

Abbreviation Meaning
CFI Canonical Format Indicator
TCI Tag Control Information
TPID Tag Protocol Identifier
VID VLAN Identifier
VLAN Virtual Local Area Network

8-4 Version: A
8 VLAN

8.2 QinQ VLAN

8.2.1 Definition

802.1Q in 802.1Q (QinQ) is a visualized name for the tunnel protocol encapsulated
based on IEEE 802.1Q. A packet in a VLAN that has the QinQ attribute contains
two VLAN tags: inner VLAN tag from the private network and outer VLAN tag from
the device. Through the outer VLAN tag, a layer 2 VPN tunnel can be set up to
transparently transmit service data from private networks to public networks. To be
specific, the VLAN tag of the private network is encapsulated to the VLAN tag of
the public network. The packet thus carries two IEEE 802.1Q VLAN tags to
traverse the service provider's backbone network. In this way, the QinQ VLAN
provides users with a simple layer 2 VPN private line service.

8.2.2 Features

Increases the number of VLANs inside the network

The IEEE 802.1ad (QinQ) was defined for increasing the number of VLANs
early; the function is implemented by adding a 802.1Q tag to the 802.1Q
packet, and the number of VLANs can reach 4k4k.

Provides an easier layer 2 VPN tunnel

In the public network, a packet is transmitted according to the outer VLAN tag
(public VLAN tag), and the user private network VLAN tag is masked. For this
reason, a user can plan the private network VLAN IDs as required, and the
private network VLAN IDs do not conflict with the public VLAN ID.

8.2.3 Specifications

Supports increasing the number of VLANs: By adding QinQ VLANs, the


system can increase the number of VLANs to 4k4k on the basis of the initial
VLAN.

Version: A 8-5
AN5516-06 Optical Line Terminal Equipment Feature Description

Supports the flexible QinQ functions: Supports adding the inner and outer
VLANs according to the conditions such as the source MAC address, the
destination MAC address, the source IP address, the destination IP address,
the L4 source port No., the L4 destination port No., the Ethernet type, the inner
VLAN, the outer VLAN, the service type, the TTL (time to live), the protocol,
the layer 1 CoS, and the layer 2 CoS.

Supports distinguishing users and services via the VLAN as follows: The two
tags of the QinQ can indicate different information; for example, the inner tag
indicates the user, and the outer tag indicates the service.

Supports setting the SVLAN based on the card / PON / ONU / ONU port.

Supports the selective QinQ at the same port; this means that some services
use the VLAN stacking, and some services use the single-layer VLAN.

8.2.4 Basic Principles

QinQ VLAN frame structure

Figure 8-2 The QinQ VLAN frame structure

For the meanings of various parameters in the tag header, please see Section
8.1.4.

8-6 Version: A
8 VLAN

Service processing flow

AN5516-06
CVLAN 1+SVLAN1 CVLAN 3+SVLAN2
CVLAN 2+SVLAN1 CVLAN 4+SVLAN2

ONU1 ONU2
CVLAN 1
CVLAN 3 CVLAN 2 CVLAN 4

PC Phone PC Phone

CVLAN: Customer-VLAN Data service


SVLAN: Service-VLAN Voice service

Figure 8-3 The service processing of the QinQ VLAN

The uplink direction: At the AN5516-06 user side, the data and voice services of
two users are tagged with the CVLAN tags respectively after passing through the
two ONUs. ONU1 accesses the data and voice services with the CVLAN ID being 1
and 3 respectively; ONU2 accesses the data and voice services with the CVLAN ID
being 2 and 4 respectively. When the services of the two users are transmitted to
the AN5516-06, the AN5516-06 adds corresponding SVLAN tags for the data and
voice services respectively; the SVLAN IDs of the data and voice services are 1
and 2 respectively. After the QinQ VLAN is added, the user service with double
VLAN encapsulation is transmitted to the upper level network.

The downlink direction: When the successfully-configured user service with double
VLAN encapsulation mentioned previously is transmitted to the AN5516-06 from
the upper level network, the system processes it as follows: If the VID of the
SVLAN tag packet brought by the service is not the same as the VID configured by
the AN5516-06, this packet will be discarded; if the VID of the SVLAN tag packet
brought by the service is the same as the VID configured by the AN5516-06, the
equipment will stripe the SVLAN tag directly, and then forward the service to the
downlink ONU. In the same mode, the ONU determines whether the VID of the
CVLAN tag packet brought by the service is the same as the configured VID; if so

Version: A 8-7
AN5516-06 Optical Line Terminal Equipment Feature Description

the ONU directly strips CVLAN tag and sends the untagged packet to the user, and
if not, discards the packet.

Flexible QinQ

The AN5516-06 uses the following flexible QinQ modes:

The port-based flexible QinQ

The basic principle is described as follows: When the equipment port receives
a packet, no matter whether the packet has a VLAN tag, the equipment tags it
with the VLAN tag (PVID) of the default VLAN for this port. In this mode, if a
packet with the VLAN tag is received, this packet will become a QinQ packet; if
an untagged packet is received, this packet will become a packet with the
default VLAN tag of the port.

The traffic-based flexible QinQ

The QinQ encapsulation according to the VLAN ID in the Ethernet frame

The basic principle is described as follows: When various services of the


same user use different CVLAN tags, the system can distinguish the
services according to their VLAN IDs. For example, the VLAN ID of the
PC Internet access service ranges from 301 to 400, the VLAN ID of the
IPTV service ranges from 201 to 300, and the VLAN ID of the VoIP
service ranges from 101 to 200; so after receiving the packets, the
AN5516-06 will tag each type of service with the SVLAN tag according to
the VLAN ID value (the corresponding SVLAN IDs are 3, 2, 1
respectively).

The QinQ encapsulation according to the VLAN ID + priority in the packet

The basic principle is described as follows: Each service has its dedicated
priority; when various services of the same user use the same CVLAN ID,
the system can distinguish the services according to their priorities and
then tag the corresponding SVLAN tag for each type of service.

The QinQ encapsulation according to the source and destination IP


addresses

8-8 Version: A
8 VLAN

The basic principle is described as follows: When the services of different


users include both the Internet service and the voice service, each
service has its dedicated source and destination IP addresses; under this
condition, the system can distinguish the IP addresses according to their
ACLs and then tag the corresponding SVLAN tag for each type of service.

The QinQ encapsulation according to the source and destination MAC


addresses

The basic principle is described as follows: When the service access is


performed between different users, the source and destination MAC
addresses in the Ethernet frame are different with each other; under this
condition, the system can distinguish the source and destination MAC
addresses and then tag the corresponding SVLAN tag for each type of
service.

The QinQ encapsulation according to the Ethernet type

The basic principle is described as follows: When the services of the


same user include both the Internet service (PPPoE) and the IPTV
service (IPoE), the protocol No. of IPoE is 0x0800, and the protocol No. of
PPPoE is 0x8863 / 8864; under this condition, the system can distinguish
the services according to their Ethernet types and then tag the
corresponding SVLAN tag for each type of service.

8.2.5 Reference Information

Standards

IEEE 802.1Q

IEEE 802.1ad

Terminologies

None

Version: A 8-9
AN5516-06 Optical Line Terminal Equipment Feature Description

Abbreviations

Abbreviation Meaning
CFI Canonical Format Indicator
CoS Class of Service
IP Internet Protocol
IPoE IP over Ethernet
ONU Optical Network Unit
PON Passive Optical Network
PPPoE Point to Point Protocol over Ethernet
TCI Tag Control Information
TPID Tag Protocol Identifier
VID VLAN Identifier
VLAN Virtual Local Area Network
VPN Virtual Private Network

8.3 VLAN Translation

8.3.1 Definition

The VLAN translation is described as follows: When multiple uplink services from
the user side pass through the terminal equipment supporting the 802.1Q protocol,
if the terminal equipment tags a fixed tag to the user service, the newly-tagged tag
may exceed the valid range of the operator; so when the service is up linked to the
ONU, the ONU will translate the default tag tagged by the terminal equipment into
the unique valid tag at the network side. Now the VLAN translation is completed.

8.3.2 Features

The VLAN translation reduces maintenance work of the operator. Via the VLAN
translation function, the VLAN trunking can be implemented at the user access side,
and one system only needs to use one SVLAN. The use of VLAN translation can
reduce maintenance work and conserve limited VID resources because only one
SVLAN is needed for a system.

8-10 Version: A
8 VLAN

8.3.3 Specifications

Supports three VLAN translation modes: the 1:1 translation, the N: 1


translation, and the hybrid translation.

Supports flexible VLAN translation functions: Can set and translate the CVLAN
and CoS based on the source MAC address, the destination MAC address,
the Ethernet type, the VLAN ID, the CoS, the source IP address, the
destination IP address, the ToS, the protocol type, the source port No., the
destination port No., etc.

8.3.4 Basic Principles

VLAN translation modes

Here we take the home gateway as an example to describe the terminal equipment
supporting the 802.1Q protocol.

The 1:1 VLAN translation mode:

Figure 8-4 The 1:1 VLAN translation mode

At the user side of the AN5516-06 the users data, voice, and multicast
services go through gateways and are labeled with fixed default VLAN tags
(for example 100, 200, 300 respectively). When the users services are
received at the ONU configured for 1:1 VLAN translation, the ONU will
substitute the configured Customer-VLAN tags for data, voice and multicast
services (for example 500, 600, and 700 respectively). When the services are
sent to the AN5516-06, they are labeled with the Service-VLAN tags (for
example 3000) on the AN5516-06. When the QinQ VLAN processing is
finished, the user services with double VLAN encapsulation are forwarded to
the providers network. In the downlink direction, the reverse process is used.

Version: A 8-11
AN5516-06 Optical Line Terminal Equipment Feature Description

The N:1 VLAN translation mode:

Figure 8-5 The N:1 VLAN translation mode

At the user side of the AN5516-06 the users data, voice, and multicast
services go through gateways and are labeled with fixed default VLAN tags
(for example 100, 200, 300 respectively). When the users services are
received at the ONU configured for N:1 VLAN translation, the ONU will
substitute a single configured Customer-VLAN tag for all services (for example
500). When the services are sent to the AN5516-06, they are labeled with the
Service-VLAN tags (for example 3000) on the AN5516-06. When the QinQ
VLAN processing is finished, the user services with double VLAN
encapsulation are forwarded to the providers network. In the downlink
direction, the reverse process is used.

The mixed VLAN translation mode:

Figure 8-6 The mixed VLAN translation mode

The mixed mode means using the 1:1 and N:1 translation modes at the same
time.

8-12 Version: A
8 VLAN

At the user side of the AN5516-06 the users data, voice, and multicast
services go through gateways and are labeled with fixed default VLAN tags
(for example 100, 200, 300 respectively). When the users services are
received at the ONU configured for hybrid mode VLAN translation, the ONU
will substitute a unique Customer-VLAN tag for some services (for example
voice services are labeled 600) and a single configured Customer-VLAN tag
for some groups of services (for example 500 for date and multicast services).
When the services are sent to the AN5516-06, they are labeled with the
Service-VLAN tags (for example 3000) on the AN5516-06. When the QinQ
VLAN processing is finished, the user services with double VLAN
encapsulation are forwarded to the providers network. In the downlink
direction, the reverse process is used.

8.3.5 Reference Information

Standards
IEEE 802.1Q

IEEE 802.1ad

Terminologies
None

Abbreviations
Abbreviation Meaning
CoS Class of Service
HG Home Gateway
IP Internet Protocol
ONU Optical Network Unit
ToS Type of Service
VID VLAN Identifier
VLAN Virtual Local Area Network

Version: A 8-13
9 DHCP

This chapter introduces the DHCP function, and includes the following sections:

DHCP Option 82

DHCP Option 60

Version: A 9-1
AN5516-06 Optical Line Terminal Equipment Feature Description

9.1 DHCP Option 82

9.1.1 Definition

The DHCP Option 82 is called the relay agent information option, and it includes
the position information of the DHCP client. The Relay Agent Information option is
inserted by the DHCP relay agent when forwarding client-originated DHCP packets
to a DHCP server. Servers recognizing the Relay Agent Information option may use
the information to implement IP address or other parameter assignment policies.

9.1.2 Features

The Option 82 can record the address information of the DHCP client and the
DHCP relay agent in the DHCP packet. A DHCP packet passing through the DHCP
realy equipment will be tagged with the unique address information, and the format
of the information can be defined via the network management system.

9.1.3 Specifications

Supports the Option 82 enabling / disabilng function.

The local basic information (access node ID, cabinet No., and subrack No.)
can be configured.

Provides 22 types of ID parameters, and supports the user defined relay ID


information.

9-2 Version: A
9 DHCP

9.1.4 Basic Principles

Figure 9-1 The principle of the DHCP Option 82

The AN5516-06 addes the Option 82 information in the user DHCP request packet
and the user access point information, and reports to the DHCP server.

The DHCP server can allocate different IP addresses or provide different


parameter values for PC1 and PC2 according to the Option 82 option information
and the pre-configured policy provided by the packet, to configure and manage the
client.

9.1.5 Reference Information

Standards

RFC 2131

RFC 3046

Terminologies

Terminology Description
The Option 82 is called the relay agent information option, and it records
Option 82
the position information of the DHCP client.
The DHCP relay forwards the user DHCP request to the designated
DHCP Relay
DHCP server.

Version: A 9-3
AN5516-06 Optical Line Terminal Equipment Feature Description

Abbreviations

Abbreviation Meaning
DHCP Option 82 DHCP Relay Agent Information Option

9.2 DHCP Option 60

9.2.1 Definition

The DHCP Option 60 obtains an IP address for the voice service in the DHCP
mode, and the Option 60 field is used to identify the user IAD information. The
AN5516-06 identifies the Option 60 field in the user DHCP packet and forwards the
packet to different DHCP servers; this enables each IAD to obtain a dedicated IP
address and perform the authentication and accounting operations via this DHCP
server.

9.2.2 Features

In the same VLAN, the AN5516-06 forwards the DHCP packets to different DHCP
servers according to the Option 60 field in the IAD DHCP packet and the
configurations of the AN5516-06, so as to obtain different IP addresses.

9.2.3 Specifications

Supports adding the line ID format.

Supports adding the ONU ID of the access point.

9-4 Version: A
9 DHCP

9.2.4 Basic Principles

Figure 9-2 The principle of the DHCP Option 60

Two types of ONUs exist at the AN5516-06 user side to access the voice service:
the AN5006-04 and the AN5006-07B; the AN5006-04 uses POTS port 1, and the
AN5006-07B uses POTS port 3. The system uses the Option 60 field to identify the
IAD modules in the two ONUs; the AN5006-04 IAD obtains the IP address
10.78.100.12 via DHCP server 1, and the AN5006-07B IAD obtains the IP address
10.79.100. 2 via DHCP server 2.

As the DHCP relay, the AN5516-06 finds the corresponding DHCP server
according to the DHCP Option 60 field from the IAD to enable the IAD to obtain the
IP address.

9.2.5 Reference Information

Standards

RFC 2131

RFC 3046

Version: A 9-5
AN5516-06 Optical Line Terminal Equipment Feature Description

Terminologies

Terminology Description
The DHCP Option 60 field is used to identify the information of the user
Option 60
ONU.
The DHCP relay forwards the user DHCP request to the designated
DHCP Relay
DHCP server.

Abbreviations

Abbreviation Meaning
DHCP Option 60 Vendor Class Identifier

9-6 Version: A
10 QoS

This chapter introduces the QoS function, and includes the following sections:

Priority ID

Mapping between the CoS priority and the queue scheduling

Congestion control

Rate limitation based on the flow and the port

Version: A 10-1
AN5516-06 Optical Line Terminal Equipment Feature Description

10.1 Priority ID

10.1.1 Definition

The priority ID includes the IP ToS, the DSCP, the 802.1P, etc., and these priority
IDs are used to identify different QoS models.

The CoS priority ID means to identify the CoS priority based on the flow.

The DSCP priority ID is described as follows: In the ToS field at the IP


header of each data packet, the occupied six bits and non-occupied two
bits are used to distinguish the priority via the coding value.

10.1.2 Features

Modification of multiple priority types

The AN5516-06 supports modifying the CoS and DSCP priorities.

Modification of multipoint priorities

The AN5516-06 supports modifying the priorities at the OLT side and the ONU
side.

10.1.3 Specifications

Supports the default CoS priority.

Supports the priority mapping.

Supports the CoS copy (copying the CoS value of the C-VLAN to the S-VLAN).

Supports modifying the DSCP according to the CoS.

Supports CoS remarking.

10-2 Version: A
10 QoS

10.1.4 Basic Principles

The commonly used modifations on the priority in the QoS include the DSCP and
the 802.1P.

The DSCP priority is indicated by the first six bits (bits 0 to 5) in the ToS field at
the IP packet header, and the value ranges from 0 to 63; the last two bits (bits
6 and 7) are reserved.

The 802.1P priority is based on the layer 2 switch QoS / CoS protocol related
to the traffic priority. In the 802.1Q protocol, a four-byte 802.1Q header is
added after the source address in the Ethernet frame header. This four-byte
802.1Q header includes the following contents:

The two-byte tag protocol identifier, with the value being 8100.

The two-byte tag control information.

A three-bit priority field exists in the TCI field, and this field is the 802.1P priority,
whose value ranges from 0 to 7 (meaning eight priorities); it is mainly used to
determine which packet is sent first under the network congestion condition.

By default, the priorities of various services in the system are arranged as follows:
VoIP = TDM > IPTV > data.

Version: A 10-3
AN5516-06 Optical Line Terminal Equipment Feature Description

10.1.5 Reference Information

Standards

RFC2474

Terminologies

Terminology Description
Refers to the priority in the 802.1P domain of an Ethernet frame, whose
CoS priority
value ranges from 0 to 7.
Refers to the priority in the ToS domain of an IP packet header field, whose
ToS priority
value ranges from 0 to 7.
In the ToS ID byte at the IP header of each data packet, the occupied
DSCP priority six bits and non-occupied two bits are used to distinguish the priority
via the coding value.

Abbreviations

Abbreviation Meaning
ToS Type Of Service
DSCP Differentiated Services Code Point
TPID Tag Protocol Identifier
TCI Tag Control Information
802.1P LAN Layer 2 QoS/CoS Protocol for Traffic Prioritization

10-4 Version: A
10 QoS

10.2 Mapping between the CoS Priority and the


Queue Scheduling

10.2.1 Definition

The mapping between the CoS priority and the queue scheduling refers to sending
a packet with a certain priority to the designated queue.

10.2.2 Features

The AN5516-06 can configure the mapping relationships between the priority and
the queue as requried, so as to control the QoS. For example, if the voice service
whose CoS priority is 6 has a relatively better QoS, users can map this service to
queue 7, so as to ensure that the voice service can be scheduled first.

10.2.3 Specifications

Supports the priority mapping.

10.2.4 Basic Principles

When a packet is to enter a queue for the scheduling operation, it needs to enter
the corresponding queue according to the mapping relationship between the
packet priority and the queue (this mapping relationship can be configured as
required).

In queues 0 to 7, queue 7 has the highest priority, and queue 0 has the lowest
priority.

By default, a fixed mapping relationship exists between the priority of a packet and
the queue that it is to enter. For example, a packet whose priority is 1 will enter
queue 1.

Version: A 10-5
AN5516-06 Optical Line Terminal Equipment Feature Description

The mapping relationship also can be re-configured according to the actual


network conditions. For example, CoS priority 2 indicates the data service, CoS
priority 3 indicates the IPTV service, and CoS priority 5 indicates the VoIP service;
the three services enter queues 1, 4, 6 respectively. The mapping relationship
between the priority and the queue is listed in Table 10-1.

Table 10-1 The mapping relationship between the priority and the queue

Queue
CoS Priority
Default Application Condition Corresponding Service
0 0
1 1
2 2 1 Data
3 3 4 IPTV
4 4
5 5 6 VoIP
6 6
7 7

10.2.5 Reference Information

Standards

RFC 2474

RFC 1349

Terminologies

Terminology Description
Refers to the priority in the 802.1P domain of the Ethernet frame, and the
CoS priority
value ranges from 0 to 7.
Means another queue mode different from the first-in first-out queue. In this
Priority queue
mode, a queue with a higher priority is usually schduled first.

Abbreviations

Abbreviation Meaning
CoS Class of Service

10-6 Version: A
10 QoS

10.3 Congestion Control

10.3.1 Definition

The congestion control means the method to implement the management, control,
and processing operations when the network congestion occurs. It is described as
follows: Uses the queue technology to schedule the packets to be sent from the
same interface into multiple queues, and processes these queues according to
their priorities. The system uses different queue algorithms to solve different
problems and obtain the required results.

When network congestion occurs, various queues will compete for the use of
resources. Under this condition, the system usually uses the queue scheduling to
meet the requirements of various services.

Strict-priority queue scheduling (SP): Processes the packets in each queue


according to the priority of this queue. The system first allows the packets in
the highest-priority queue to leave and sends them; after the packets in the
highest-priority queue are all sent, the system sends the packets in other
queues with lower priorities.

Weighted round robin scheduling (WRR): The system assigns a dedicated


weight value for each queue. Depending on the weight, the packets in a
high-weight priority queue have more chance to be processed than the
packets in a low-weight priority queue, and each queue uses the bandwidth
resource according to its weight proportion.

Mixed-mode scheduling (SP + WRR): The high-priority queues use the SP


mode, and the low-priority queues use the WRR mode. In this mode, the
system first sends the packets in the high-priority queues; after the packets in
the high-priority queues are all sent, each low-priority queue uses the
bandwidth resource according to its weight proportion.

10.3.2 Features

The AN5516-06 supports the SP, WRR, and mixed-mode queue scheduling.

Version: A 10-7
AN5516-06 Optical Line Terminal Equipment Feature Description

10.3.3 Specifications

Each AN5516-06 port supports eight priority queues.

Supports the queue scheduling in the SP mode.

Supports the queue scheduling in the WRR mode.

Supports the queue scheduling in the SP + WRR mode.

10.3.4 Basic Principles

SP mode

Figure 10-1 The principle of the queue scheduling in the SP mode

1. The system first remarks the priorities of and classifies the packets in the eight
flows via the configured flow classification rules and flow policies.

2. Performs the priority mapping, and arranges the packets into different priority
queues.

3. The system sends the packets strictly according to the queue priority: First
sends the packets in the high-priority queues, then sends the packets in the
medium-priority queues, and finally sends the packets in the low-priority
queues.

10-8 Version: A
10 QoS

WRR mode

Figure 10-2 The principle of the queue scheduling in the WRR mode

1. The system first remarks the priorities of and classifies the packets in the eight
flows via the configured flow classification rules and flow policies.

2. Performs the priority mapping, and arranges the packets into different priority
queues.

3. In each scheduling circle, each priority queue sends its packets according to
the weight proportion 1: 2: 1.

SP + WRR mode

Figure 10-3 The principle of the queue scheduling in the SP + WRR mode

1. The system first remarks the priorities of and classifies the packets in the eight
flows via the configured flow classification rules and flow policies.

2. Performs the priority mapping, and arranges the packets into different priority
queues.

3. For the high-priority queues, the system uses the SP scheduling mode; this
means that the system sends the packets in them first.

Version: A 10-9
AN5516-06 Optical Line Terminal Equipment Feature Description

4. For other priority queues, the system uses the WRR scheduling mode; in this
example, each priority queue sends its packets according to the weight
proportion 7: 3.

10.3.5 Reference Information

Standards

RFC2481

RFC1633

Terminologies

Terminology Description
Weight The weight means the proportion of a queue to occupy resources.
Congestion is described as follows: If the number of the packets reaching a
certain part in the communication subnet is so many that this part of network
cannot process these packets in time, and this causes the performance
Congestion
degradation of this part and even the entire network; under the worst
conditions, the communication services in the network will be interrupted
(this is called dead lock).

Abbreviations

Abbreviation Meaning
PQ Priority Queue
WRR Weighted Round Robin
SP Strict Priority

10-10 Version: A
10 QoS

10.4 Rate Limitation Based on the Flow and the


Port

10.4.1 Definition

To manage the bandwidth of each service, users can configure the rate limitation
parameters based on the port and the flow. The purpose of this operation is to
ensure that a certain port or flow does not occupy too much bandwidth.

10.4.2 Features

None.

10.4.3 Specifications

Supports the service bandwidth limitation.

Supports the port bandwidth limitation.

10.4.4 Basic Principles

Port-based and flow-based rate limitation of the uplink service

At the ONU side, if each logic link bears only one type of service, users can
perform the flow-based rate limitation according to the LLID. If a certain logic
link bears multiple types of services, the flow-based rate limitation is not
supported; under this condition, users only can perform the rate limitation of a
certain type of services or use the port-based rate limitation for the ONU.

At the OLT side, the interface card can distinguish the uplink service flow and
perform the flow-based rate limitation of the service flow in each PON.

Port-based and flow-based rate limitation of the downlink service


At the ONU side, the rate limitation principle is the same as that of the uplink
service. An FTTB ONU supports the downlink port-based and flow-based rate
limitation, and an FTTH ONU only supports the downlink port-based limitation.

Version: A 10-11
AN5516-06 Optical Line Terminal Equipment Feature Description

At the OLT side, the core switch card can distinguish the downlink service flow
and perform the flow-based rate limitation of each flow type; in addition, the
core switch card supports the downlink port-based limitation.

10.4.5 Reference Information

Terminologies

Terminology Description
Means the logical link identification. When an OLT broadcasts and sends
LLID the downlink signals continuously, the ONU will receive the downlink signals
selectively according to the LLID.

Abbreviations

Abbreviation Meaning
LLID Logical Link Identification

10-12 Version: A
11 ACL

This chapter introduces the ACL function, and includes the following sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 11-1
AN5516-06 Optical Line Terminal Equipment Feature Description

11.1 Definition
The access control list (ACL) refers to the feature in which series of mapping rules
are configured to filter data packets and then to recognize the objects to be filtered.
After the specific objects are recognized, the corresponding data packets are
permitted to pass or prohibited from passing according to the preset policy.

11.2 Features
The ACL filtering function can increase the system security effectively.

11.3 Specifications
The AN5516-06 supports four ACL types listed in the following table:

ACL Type ACL SN Range Feature


Basic ACL 1 to 99 The matching rule: source IP address
The matching rules: source IP address, destination
Extension ACL 100 to 199 IP address, IP protocol type, source port, destination
port, etc.
The matching rules: source MAC address,
Link layer ACL 200 to 299 destination MAC address, CoS, VLAN ID, Ethernet
protocol type, etc.
The matching rule: random combination of the first
User defined ACL 300 to 700
80 bytes in the layer 2 frame

11-2 Version: A
11 ACL

11.4 Basic Principles


Principle diagram

Figure 11-1 The principle of the ACL function

Working flow

1. The system matches a packet according to the given matching rules. If the
packet matches a certain rule, and the designated action to the matched
packet is forwarding, the system does not match this packet with other rules,
and performs the QoS processing operations.

2. The QoS processing operations include the following aspects:

Packet filtering

The system determines whether to discard the packets depending on


whether the packets match with the ACLs.

Priority tagging

The system tags priority on the packets that match the ACLs. The tags
include the TOS, DSCP and 802.1P tags.

Traffic limiting

The system limits the rate of the packets that match the ACLs.

Port rate limiting

The system limits the rate for the packet transmission on an Ethernet port.

Traffic statistics

Version: A 11-3
AN5516-06 Optical Line Terminal Equipment Feature Description

The system collects statistics on the packets that match the ACLs.

Packet redirection

The system redirects the packets that match the ACLs to another port
(that is, the original destination port no longer receives or forwards the
packets).

Packet mirroring

The system mirrors the packets that match the ACLs to another port (that
is, the packets are duplicated to another port).

3. If the packet mentioned previously does not match the ACL rules, or it matches
the ACL rules but the designated action to the matched packet is discarding,
the system discards the packet.

11.5 Reference Information


Standards

RFC 4314

Terminologies

Terminology Description
Means the differentiated services code point. It is in the service type (ToS)
ID byte at the IP header of each packet, and the occupied six bits and
DSCP
non-occupied two bits are used to distinguish the priority via the coding
value.
802.1P Is the LAN layer 2 QoS / CoS protocol for traffic prioritization.
Means to mirror some data streams, and each connection has data streams
Flow mirroring
in two directions.

Abbreviations

Abbreviation Meaning
ACL Access Control List

11-4 Version: A
12 NTP

This chapter introduces the NTP function, and includes the following sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 12-1
AN5516-06 Optical Line Terminal Equipment Feature Description

12.1 Definition
The Network Time Protocol (NTP) is an application layer protocol in the TCP/IP
protocol suite. NTP is used to synchronize the time between the distributed time
server and the client. The implementation of NTP is based on IP and UDP. NTP
involves the Time Protocol and the ICMP Timestamp Message, with special design
on accuracy and robustness.

12.2 Features
The AN5516-06 can implement the time synchronization between the NTP client
and the NTP server. The accuracy is at the second level.

12.3 Specifications
Supports the selection of clock modes.

12-2 Version: A
12 NTP

12.4 Basic Principles

Figure 12-1 The principle of the NTP function

As the NTP client, the AN5516-06 keeps to the following working flow:

1. The AN5516-06 sends an NTP packet to the router. This packet contains the
timestamp when it leaves the AN5516-06.

2. When the NTP packet arrives at the router, the router adds its timestamp to
the packet. Assume that the timestamp is T2.

3. When the NTP packet leaves the router, the router adds another timestamp to
the packet. Assume that the timestamp is T3.

4. When the AN5516-06 receives the response packet, it adds a new timestamp
to the packet. Assume that the timestamp is T4.

5. The AN5516-06 works out the transmission delay (DELAY) and clock offset
(OFFSET) between the AN5516-06 and the router. In this way, the AN5516-06
can set its clock according to the information and thus keeps its clock
synchronized with that of the router (the router acts as the NTP server).

Version: A 12-3
AN5516-06 Optical Line Terminal Equipment Feature Description

6. DELAY=(T4-T1)(T3-T2)

7. OFFSET=[(T2-T1)+(T3-T4)]/2

12.5 Reference Information


Standards

RFC1305

Terminologies

Terminology Description
The timestamp means the number of seconds from 00:00:00 (GMT),
Timestamp January 1st, 1970. It is the base for the NTP to implement the clock
synchronization.
The No. of a layer means the network layer No. of an NTP server in the NTP
protocol. The clock whose layer No. is 0 has the highest accuracy, the NTP
The number of server whose layer No. is 1 synchronizes with the NTP server whose layer
a layer No. is 0, the NTP server whose layer No. is 2 synchronizes with the NTP
server whose layer No. is 2. The accuracy of the clock decreases from 0 to
14.

Abbreviations

Abbreviation Meaning
NTP Network Time Protocol

12-4 Version: A
13 RSTP

This chapter introduces the RSTP function, and includes the following sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 13-1
AN5516-06 Optical Line Terminal Equipment Feature Description

13.1 Definition
The RSTP means the rapid spanning tree protocol, and is one of the layer 2
management protocols. The RSTP is an improvement on STP. It implements path
redundancy through certain algorithms. RSTP also prunes a loop network into a
loop-free tree network. This helps to avoid proliferation and infinite loop of packets
in the loop network. RSTP features fast convergence in the event of network
topology changes.

13.2 Features
By blocking the redundant links in the network selectively, the RSTP can
eliminate the layer 2 loops in the network, so as to solve the broadcast storm
problem of the looped Ethernet network and eliminate the circle connections
caused by mistakes or accidents.

The RSTP enables a bridge connection / switch, bridge connection port, or


LAN to resume its connectivity instantly after a fault occurs. The root port and
designated port can be switched to the forwarding status rapidly. The RSTP
can reduce the re-configuration and service resuming time after a connection
fault occurs to less than one second.

13.3 Specifications
All AN5516-06 uplink cards (the HU1A card, the HU2A card, and the GU6F card)
and their uplink ports supports the RSTP function. The RSTP parameters and their
value ranges are described as follows:

Port priority: 0 to 240;

Port path: 0 to 200000000.

13-2 Version: A
13 RSTP

13.4 Basic Principles


Basic thought

The RSTP uses the rapid spanning tree algorithm to block some redundant paths
in the switching network and establish a loop-free tree network. The rapid spanning
tree algorithm used by the RSTP is the same as the spanning tree algorithm, and it
is also a distributed algorithm. The RSTP runs at all bridges (or switches) in a
bridge, and it works out the tree active topology of the simple interconnection for
the bridge network. When performing the calculation operation, the RSTP first
selects a bridge to act as the root (namely root bridge), and it assigns a role for
each port of each bridge at the same time.

The RSTP has many important improvements on the base of the STP, so as to
increase the convergence speed greatly.

Sends BPDUs intermittently: A non-root bridge of the STP only transfers


BPDUs generated by the root bridge; a bridge of the RSTP sends its own
BPDU configuration information in each hello time interval (the default is two
seconds), no matter whether it receives the BPDUs from the root bridge.

Rapidly ages information: The STP only updates BPDUs when the 20-second
aging interval is expired. The RSTP uses the heartbeat mechanism as follows:
When a certain bridge does not receive the BPDU for three times continuously,
the bridge will determine that the root of the neighbor and the designated roots
have been lost, so it will age its BPDU configuration information at once.

Basic concept

In the RSTP, a bridge has two roles: the root bridge and the designated bridge. The
topology information is exchanged between various bridges. The root has the
highest priority ID in all bridges. Before the spanning tree is formed, each bridge
regards itself as the root bridge by default. After the spanning tree is formed stably,
one root bridge and several designated bridges will be generated. When the
topology architecture changes, the root bridge will notify other bridges to calculate
the topology again.

Version: A 13-3
AN5516-06 Optical Line Terminal Equipment Feature Description

Depending on the action of a port in the active topology, the RSTP defines five
types of port roles (the STP only has three types of port roles): disabled port, root
port, designated port, alternate port for supporting the rapid features of the RSTP,
and backup port. They are detailed as follows:

Root port: When the switch forwards a packet to the root bridge, the root
bridge can provide a minimum path cost for this packet.

Designated port: This port is connected to the designated switch; when the
designated switch forwards the packets from the LAN to the root bridge, this
port can provide a minimum path cost. The port connected with the LAN via
the designated switch is called the designated switch.

Alternate port: This is a dedicated port role of the RSTP. It provides an


alternate path for the connection from the current root port to the root bridge.

Backup port: This is a dedicated port role of the RSTP. It provides a backup
path for the designated port reaching the spanning tree leaf. The backup port
can exist only under the following conditions: Two ports are connected with
each other via a loop composed of a point-to-point link, or the switch has two
or more connections to reach the shared LAN network segment.

Disabled port: This is a port role already existing in the STP. It does not act as
any role in the spanning tree operation, and does not join the RSTP
calculation.

Protocol working flow

The main working flow of the RSTP protocol is to determine the bridge role and the
port role and status.

1. Determines the root bridge. When the equipment is started for the first time, it
always regards itself as the root bridge and sends a BPDU message for
notification. Each equipment set will analyze the corresponding information
after receiving the BPDU message and compares the IDs of various bridges
(first compares the bridge priorities; if they are the same, then compares the
MAC address), and the bridge whose ID is the least is selected as the root
bridge. If a certain equipment set whose bridge ID is less than that of the
current root bridge joins the network, it will declare that it is the root bridge first.
After other equipment sets receive the BPDU message from this equipment
set, they will determine that it is the new bridge and record it after the
comparison.

13-4 Version: A
13 RSTP

2. Determines the root port. The port whose connection path with the root bridge
has the minimum cost is the root port.

3. After the root bridge and the root port are determined, the system starts to
prune the redundant loops. This is implemented by blocking the corresponding
ports on the non-root bridges. Finally one root bridge and several designated
bridges will appear in the entire network.

Network diagram

The RSTP network diagram of the AN5516-06 is shown in Figure 13-1.

Figure 13-1 The RSTP network

Version: A 13-5
AN5516-06 Optical Line Terminal Equipment Feature Description

As Figure 13-1 shows, three AN5516-06s performs the RSTP calculation operation
to avoid forming loops. Via the comparison, the system determines the root bridge
and the designated bridges, and then determines the status of each port. P1 has a
higher priority than P4, so the alternate port of the P4 connection is blocked. P3
has a smaller ID than P5, so the backup port of the P5 connection is blocked.
When P1 or P2 has faults, the RSTP will perform the calculation operation again,
and the alternate port or the backup port will enter the forwarding status; so the
network communication will not be influenced.

13-6 Version: A
13 RSTP

13.5 Reference Information


Standards

IEEE 802.1W

IEEE 802.1D

Terminologies

Terminology Description
Means the port connected with the root bridge or having the best path to the
Root port
root bridge.
All ports on the root bridge are designated ports. When the designated
Designated
bridges have loops, a port at the low-cost path is the designated port, and
port
a port at the high-cost path is the non-designated port.
It provides an alternate path for the connection to the root bridge, and this
Alternate port
path is not the same as the path from the port to the root bridge.
It is used to backup the path from the designated port to the spanning tree
Backup port
leaf.
For a port, the smaller is the priority value, the higher is the priority. A port
Port priority
with a higher priority has more chance to act as the root port.
The RSTP protocol can detect the link rate of the current Ethernet port
Port path cost
automatically, and work out the corresponding path cost.

Abbreviations

Abbreviation Meaning
BPDU Bridge Protocol Data Unit
RSTP Rapid Spanning Tree Protocol
STP Spanning Tree Protocol

Version: A 13-7
14 Ethernet Link Aggregation

This chapter introduces the Ethernet link aggregation function, and includes the
following sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 14-1
AN5516-06 Optical Line Terminal Equipment Feature Description

14.1 Definition
The link aggregation means to aggregate multiple links into one link for the
management, so as to meet the demands on the higher channel bandwidth and the
security. The aggregated link can be connected with the equipment with higher
bandwidth demands.

The link aggregation configuration modes include the manual aggregation and the
dynamic aggregation. The dynamic aggregation complies with the LACP protocol.
The LACP is the control protocol defined in IEEE 802.3ad to implement the link
dynamic aggregation.

14.2 Features
Meets the demand on the higher bandwidth. When the operator cannot
construct the physical link with a high bandwidth, it can form a logical link via
the link aggregation, so as to extend the link bandwidth to n times of the
original link bandwidth.

Equalizes the load. Implements the load sharing in a certain aggregation group,
so as to equalize the traffic load between various ports automatically.

Provides higher link reliability. When a certain physical link in the link
aggregation has faults, its traffic will be switched to other links automatically.

When configuring the aggregated link, users do not need to modify the upper
level protocols.

If it is needed to back up the links dynamically, users can implement the


manual dynamic backup between various member ports in the same
aggregation group via the link aggregation configuration.

14-2 Version: A
14 Ethernet Link Aggregation

14.3 Specifications
The AN5516-06 has the aggregation capability as follows:

Supports up to 16 aggregation groups, and each aggregation group includes


up to 11 physical ports.

Supports both intra- and inter- uplink card port aggregation.

The system priority: 0 to 65535.

The port priority: 0 to 32767.

The short LACP_timeout: 1 second to 10 seconds, with the default being 1


second.

The long LACP_timeout: 20 seconds to 40 seconds, with the default being 30


seconds.

14.4 Basic Principles


Manual aggregation group

The members in a TRUNK group are configured manually by users, the LACP
protocol does not run, and the system is not allowed to add or delete ports in the
aggregation group automatically. Each aggregation group must include one port at
least. When an aggregation group includes only one port, users can delete this port
from the aggregation group only by deleting this aggregation group. A group
includes one master port and several member ports. Via the configuration and
management of the master port, users can configure and manage all ports in this
TRUNK group.

In this mode, users need to combine random certain ports on the AN5516-06 uplink
card to form an aggregation group and implement the link aggregation.

Version: A 14-3
AN5516-06 Optical Line Terminal Equipment Feature Description


Figure 14-1 The manual aggregation group

Dynamic aggregation group

In the dynamic aggregation mode, the system creates / deletes the aggregation
group and its members automatically, the LACP is running, and users are not
allowed to add or delete member ports in the aggregation group. Multiple ports can
be aggregated dynamically only when they have the same rate and duplex features,
are connected to the same equipment, and have the same basic configurations.

The LACP protocol exchanges information with the opposite end via the LACPDU.
When the LACP protocol of a certain port is enabled, this port sends LACPDU to
notify the opposite end of its own system priority, system MAC address, port priority,
port No., and operation key. After receiving the previous information, the opposite
end compares them with the information saved by other ports to select the ports
that can join the aggregation. Via this operation, the two parties can reach an
agreement on a port joining or exiting a certain dynamic aggregation group.

The operation key is a configuration combination generated by the LACP protocol


according to the port configuration (rate, duplex, basic configuration, management
key) when the port aggregation is performed.

When running the LACP, the AN5516-06 can aggregate multiple ports on the uplink
card automatically, so as to implement the link aggregation function.

14-4 Version: A
14 Ethernet Link Aggregation


Figure 14-2 The dynamic aggregation group

14.5 Reference Information


Standards
IEEE 802.3ad

Terminologies

Terminology Description
TURNK Port aggregation
It is the port in a certain TRUNK group to act as the representative of this
Master port
group, and users can manage this group via managing this port.
Member port Any port except for the master port in a TRUNK group.
It is a configuration combination including rate, duplex, basic configuration,
Operation key
and management key.

Abbreviations

Abbreviations Meaning
LACP Link Aggregation Control Protocol
LACPDU Link Aggregation Control Protocol Data Unit

Version: A 14-5
15 Ethernet Port Mirroring

This chapter introduces the port mirroring function, and includes the following
sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 15-1
AN5516-06 Optical Line Terminal Equipment Feature Description

15.1 Definition
The port mirroring is to copy and forward all data traffics on a certain port to
another port, so as to view and analyze the working status and network traffic of
the mirrored port.

15.2 Features
Can monitor the ingress and egress packets on a port.

Via the data obtained from the mirroring, users can analyze the network faults
and isolate faults perfectly.

The data transmission of the monitored port is not influenced by the mirroring
operation.

15.3 Specifications
The AN5516-06 supports the one-to-one port mirroring.

15.4 Basic Principles


In the port mirroring, the port whose traffics are copied is the monitored port, and
the port to which the traffics are copied is the monitoring port. The monitoring port
is connected with a data analyzer, and users can analyze the data of the monitored
port. The connection diagram of the port mirroring is shown in Figure 15-1.

15-2 Version: A
15 Ethernet Port Mirroring

Figure 15-1 The port mirroring

The switch is connected with the monitored port, and the monitor equipment is
connected with the monitoring port. The data of the monitored port can be copied to
the monitoring port synchronously, so the monitoring port can monitor the data
conditions of the monitored port.

The port mirroring does not influence the normal service transmission of the
monitored port. It only sends the copies of the Tx / Rx packets of the monitored port
to the monitoring port.

In the port mirroring, users can set the flow of the data to be monitored, and the
flow can be ingress, egress, or bidirectional. But in one mirroring task, all monitored
ports must have the same data flow.

Users need to pay attention that when a certain port in an aggregation group
becomes a monitored port, its aggregation function will be disabled.

Version: A 15-3
AN5516-06 Optical Line Terminal Equipment Feature Description

15.5 Reference Information


Standards

None

Terminologies

Terminology Description
It is the destination port of the copied data stream, connected with the data
Monitoring port
analysis device.
Monitored port It is the port whose data stream is copied, namely the analyzed object port.

Abbreviations

None

15-4 Version: A
16 DBA

This chapter introduces the DBA function, and includes the following sections:

Definition

Features

Specifications

Basic principles

Reference information

Version: A 16-1
AN5516-06 Optical Line Terminal Equipment Feature Description

16.1 Definition
The DBA is the dynamic bandwidth assignment mechanism. It is used to increase
the utilization ratio of the system uplink bandwidth and assure the service fairness
and QoS, and can assign the bandwidth authorization according to the queuing
status information reported by the LLID.

16.2 Features
Utilizes the idle bandwidth effectively and increase the bandwidth utilization
ratio.

Accommodates to variable traffics and the burst service.

Provides high-speed connection service and better QoS for users.

16.3 Specifications
The bandwidth allocation granularity of the DBA is in steps of 256 kbit/s

The minimum configurable bandwidth of the DBA is no more than 512 kbit/s;

The accuracy of the DBA is better than 5%.

16-2 Version: A
16 DBA

16.4 Basic Principles


Bandwidth assignment types

The DBA has three bandwidth assignment types as follows:

Fixed bandwidth: The fixed bandwidth is reserved for a dedicated ONU or the
dedicated service of an ONU. Even if the ONU does not have the
fixed-bandwidth uplink service traffic, the AN5516-06 still assigns the
authorization corresponding to this fixed bandwidth, and this fixed bandwidth
cannot be used by other ONUs either. The fixed bandwidth is mainly used for
the ONUs (or LLIDs) with the TDM service, so as to guarantee a smaller
transmission delay of the TDM service. Generally, the fixed bandwidth is
implemented by the AN5516-06 via sending the authorizations of fixed number
to the ONU in a smaller polling period and higher authorization frequency.

Assured bandwidth: The assured bandwidth is the bandwidth that that an ONU
is assured to obtain, and is authorized by the AN5516-06 according to the
report information of each ONU. When the actual traffic of an ONU does not
reach the assured bandwidth, the AN5516-06 DBA mechanism can assign the
unused bandwidth to services of other ONUs. If the actual traffic of an ONU
exceeds the assured bandwidth, the AN5516-06 also can guarantee that this
ONU obtains the bandwidth at least equal to the assured bandwidth, even if
the traffic congestion occurs in the uplink direction of the system.

Best effort bandwidth: It is also called the maximum bandwidth. When the
bandwidth of a PON port is not used by other high-priority services, the ONU
can use it. For the best effort bandwidth, the AN5516-06 assigns the
authorization for an ONU according to the reports information of all online
ONUs in the PON system and the bandwidth using conditions of the PON port,
and the system does not guarantee the bandwidth size that is obtained by this
ONU or the dedicated service of the ONU.

For a dedicated ONU, the AN5516-06 DBA mechanism supports combinations of


the three bandwidth assignment types mentioned previously.

Version: A 16-3
AN5516-06 Optical Line Terminal Equipment Feature Description

Polling and authorization mechanism

The AN5516-06 DBA mechanism supports using different polling and authorization
periods for different ONUs under one PON port. For example, for an ONU with the
TDM service, the AN5516-06 can select a shorter polling period and a higher
authorization frequency than those of other ONUs.

Fairness mechanism

The AN5516-06 DBA algorithm supports the fairness mechanism, and it can
guarantee that the remaining bandwidth is assigned fairly according to the SLA.
The AN5516-06 assigns the remaining bandwidth in the weighted mode according
to the SLA assured bandwidth for each user.

16-4 Version: A
16 DBA

16.5 Reference Information


Standards

ITU-T G.983.4

Terminologies

Terminology Description
The fixed bandwidth is reserved for a dedicated ONU or the dedicated
service of an ONU. Even if the ONU does not have the fixed-bandwidth
Fixed
uplink service traffic, the OLT still assigns the authorization corresponding to
bandwidth
this fixed bandwidth, and this fixed bandwidth cannot be used by other
ONUs either.
The assured bandwidth is the bandwidth that that an ONU is assured to
Assured
obtain, and is authorized by the OLT according to the report information of
bandwidth
each ONU.
Best effort When the bandwidth of a PON port is not used by other high-priority
bandwidth services, the ONU can use the best effort bandwidth.

Abbreviations

Abbreviation Meaning
DBA Dynamic Bandwidth Assignment
LLID Logic Link Identifier
QoS Quality of Service
SLA Service-Level Agreement
TDM Time Division Multiplexing

Version: A 16-5
17 Redundancy Backup

This chapter introduces the redundancy backup function, and includes the
following sections:

Redundancy backup of the core switch card

Redundancy backup of the uplink port

Redundancy backup of the PON port

Version: A 17-1
AN5516-06 Optical Line Terminal Equipment Feature Description

17.1 Redundancy Backup of the Core Switch


Card

17.1.1 Definition

The redundancy backup of the core switch card is described as follows: The
AN5516-06 can be configured with two core switch cards (active and standby), so
as to implement the 1+1 protection switching of the core switch card.

17.1.2 Features

Increases the security of the core switch card.

Ensures the equipment safety and the normal running of services effectively.

17.1.3 Specifications

Supports the 1+1 protection switching of the core switch card.

Supports the configuration data synchronization between the active and


standby core switch cards.

Supports the automatic switching and manual switching of the core switch
card.

The switching time of the core switch card is less than 50 ms.

17-2 Version: A
17 Redundancy Backup

17.1.4 Basic Principles

The AN5516-06 supports the configuration of two core switch cards (active and
standby) and the 1+1 protection switching of the core switch card. When the
switching of the core switch card occurs, all services are switched to the standby
core switch card; the standby core switch card is activated, and it takes charge of
the duty of the active one.

Configuration synchronization

The AN5516-06 supports the configuration information real time synchronization


function between the active and standby core switch cards. When executing any
commands / operations (except for the query operation), the active core switch
card sends the command to the standby card, and the standby card performs no
configurations of other cards; this can guarantee the real time active / standby
switching and avoid influencing services when the active / standby switching is
performed.

Active / standby switching module

The active / standby switching module is abbreviated as the HSS module. This
module makes the core switch card have a good fault-tolerance feature, and when
the system has faults, the card can respond rapidly to reduce the influence on
services. It performs the following functions:

Determines the identity of the active / standby core switch cards. The
corresponding operations vary with the identities. The active card not only
modifies its own data structure, but also delivers the specific configuration
command to the corresponding service card to execute it; the standby card
only needs to modify its own data structure, but does not need to configure the
service cards.

Determines the switching time. The switching can be classified into two
conditions: the automatic switching and the manual switching. The active /
standby switching module should determine the switching time rapidly and
accurately, so as to ensure the normal running of the entire system and reduce
the influence on services.

Version: A 17-3
AN5516-06 Optical Line Terminal Equipment Feature Description

Active / standby switching time

When one of the following conditions occurs, the active / standby switching will be
performed:

The active core switch card has faults, including the hardware or software
abnormality.

The active core switch card is unplugged.

The network management system delivers a forced switching command.

17.1.5 Reference Information

Standards

None

Terminologies

None

Abbreviations

Abbreviation Meaning
HSS Hot Standby Switching

17-4 Version: A
17 Redundancy Backup

17.2 Redundancy Backup of the Uplink Port

17.2.1 Definition

The redundancy backup of the uplink port is described as follows: The AN5516-06
supports setting the master and slave uplink ports as a protection group;
depending on the uplink port status, it performs the switching between the master
and slave uplink ports, so as to ensure the safety of the uplink line.

17.2.2 Features

Increases the security of the uplink line.

Ensures the reliability of the uplink service.

17.2.3 Specifications

Supports the dual-homed protection function of the uplink port.

When the active up link is abnormal, the equipment supports switching to the
standby up link automatically.

When the active up link resumes normal state, the equipment supports two
working modes: recovering to the active up link automatically and not
recovering to the active up link automatically.

The uplink port protection switching time is less than 50 ms.

Supports the card protection of the uplink card. When users set the card
protection of the uplink card, the uplink cards must be of the same type, and
the master / slave uplink port protection groups should be established in turn
according to the port sequence.

Supports the port protection of the uplink card. When users set the port
protection of the uplink card, the two uplink ports forming the protection group
can be located at either one uplink card or two uplink cards. The uplink card
types can be either the same or different, but the uplink port types must be the
same.

Version: A 17-5
AN5516-06 Optical Line Terminal Equipment Feature Description

17.2.4 Basic Principles

Network of the master and slave up links

The AN5516-06 supports the dual-homed protection of the uplink port. This is
described as follows: Two AN5516-06 up links are connected to two uplink
equipment sets respectively; when the AN5516-06 detects that one active up link is
abnormal, services are switched to another standby up link.

The connection diagrams of the master and slave up links are shown in Figures
17-1 and 17-2.

Figure 17-1 The connection of the master and slave up links on the same uplink card

17-6 Version: A
17 Redundancy Backup

Figure 17-2 The connection of the master and slave up links on different uplink cards

Master and slave ports

One protection group includes the master port and the slave port.

Master port: It enters the active status (namely the forwarding status) first.

Slave port: Under normal conditions, it is in the standby status (namely the
blocking status).

When the link of the master port has faults and the link of the slave port is normal,
the links will be switched, and the slave port will enter the active status.

Switching mechanism

When the dual-homed protection is enabled, the master port first enters the
forwarding status. The link monitoring module of the uplink card monitors the
working conditions of the master port in real time. If the link monitoring module of
the uplink card finds that the master port fails, it will generate an interruption on the
CPU of the core switch card via the interruption bus of the backplane. Then the
software of the core switch card responds to the interruption immediately; this
means blocking the master port and setting the slave port to the forwarding status.
The configuration information of the master port (including VLAN, Trunk, port
priority, port rate, duplex mode, etc.) will be synchronized to the slave port in real
time, so as to implement the seamless switching.

Version: A 17-7
AN5516-06 Optical Line Terminal Equipment Feature Description

After the switching occurs, the equipment continues to detect the status of the
master port. When detecting that the master port has resumed normal state, the
equipment runs as follows: if it is set as recovering to the master link automatically,
the master port will enter the forwarding status, and the slave port will enter the
blocking status; if it is set as not recovering to the master link automatically, the
current master and slave ports will not change.

The master / slave uplink port switching flow is shown in Figure 17-3. In this figure,
the automatically recovering to the master link mode is taken as an example.

Figure 17-3 The master / slave uplink port switching flow (recovering to the master link
automatically)

17-8 Version: A
17 Redundancy Backup

17.2.5 Reference Information

Standards

None

Terminologies

Terminology Description
Means that dual nodes and routes are adopted, and offer redundancy
Dual-homed
mutually.

Abbreviations

Abbreviation Meaning
PE Provider Edge
VLAN Virtual Local Area Network

Version: A 17-9
AN5516-06 Optical Line Terminal Equipment Feature Description

17.3 Redundancy Backup of the PON Port

17.3.1 Definition

The redundancy backup of the PON port is described as follows: The AN5516-06
supports setting the master and slave PON ports as a PON port protection group;
when the optical circuit has faults, the service data switching can be completed
rapidly in the protection group, so as to protect the user services.

17.3.2 Features

Increases the security of the PON port and the optical fiber line.

Ensures the reliability of the service.

17.3.3 Specifications

The equipment supports up to 64 PON port protection groups.

The equipment supports types B, C, D of the PON port protection.

Supports both the intra- and inter- interface card PON port protection.

17.3.4 Basic Principles

PON port protection group mode

The AN5516-06 supports types B, C, D of the PON port protection mode.

Type B: Provides the redundancy protection for the OLT PON port and the
optical fiber between the splitter and the OLT. The AN5516-06 supports the
PON port protection on the same PON interface card or between two PON
interface cards.

OLT: The standby PON port is under the cold standby status; the OLT
detects the line status and PON port status, and completes the PON port
switching.

17-10 Version: A
17 Redundancy Backup

Splitter: One 2: N splitter is used.

ONU: No special requirements exist.

Figure 17-4 Principle of type B of the PON port protection

Type C: Provides dual OLT PON ports, dual ONU optical modules, dual optical
fibers between the splitter and OLT, dual splitters and distribution optical fibers
for redundancy protection. The AN5516-06 supports the PON port protection
on the same PON interface card or between two PON interface cards.

OLT: The active and standby PON ports are both under the working status;
the OLT should guarantee that the service information of the active PON
port can be backed up to the standby PON port synchronously so that the
standby PON port can maintain the service attributes of the ONU in
course of protection switching.

Splitter: Two 1: N splitters are used.

ONU: Uses one PON chip and two different optical modules. The standby
optical module is under the cold standby status.

1:N optical splitter


Optical
module
PON MAC chip
Optical
PON port (1) module
Optical
PON MAC chip module

PON port (2) 1:N optical splitter


Optical
PON MAC chip module Optical
module
PON MAC chip
Optical
module

Figure 17-5 Principle of type C of the PON port protection

Version: A 17-11
AN5516-06 Optical Line Terminal Equipment Feature Description

Type D: Provides dual OLT PON ports, dual ONU optical modules, dual optical
fibers between the splitter and OLT, dual splitters and distribution optical fibers
for redundancy protection. The AN5516-06 supports the PON port protection
on the same PON interface card or between two PON interface cards.

OLT: The active and standby PON ports are both under the working status;
the OLT should guarantee that the service information of the active PON
port can be backed up to the standby PON port synchronously, so that the
standby PON port can maintain the service attributes of the ONU in
course of protection switching.

Splitter: Two 1: N splitters are used.

ONU: Uses two PON chips and two different optical modules. The standby
optical module is under the hot standby status.

Figure 17-6 Principle of type D of the PON port protection

Switching trigger conditions

The AN5516-06 PON protection control module monitors the optical modules
under the active status; if the optical signals of a certain optical module is
interrupted, the line card CPU controls and starts the switching.

17-12 Version: A
17 Redundancy Backup

17.3.5 Reference Information

Standards

ITU-T G.984.3

Terminologies

None

Abbreviations

Abbreviation Meaning
CPU Central Processing Unit
OLT Optical Line Termination
ONU Optical Network Unit
PON Passive Optical Network

Version: A 17-13
18 User Security

This chapter introduces the user security function, and includes the following
sections:

Anti MAC spoofing

Data encryption of an EPON user

Data encryption of a GPON user

Version: A 18-1
AN5516-06 Optical Line Terminal Equipment Feature Description

18.1 Anti MAC Spoofing

18.1.1 Definition

MAC spoofing means that the malicious users forge the MAC addresses and attack
the network by transmitting packets. Malicious users can forge the MAC addresses
of common users to damage the services of these users. Malicious users can also
transmit a large number of forged packets that contain different MAC addresses to
the system, which affects the normal operation of the system or even causes the
system to be down. The anti MAC spoofing feature refers to the feature that the
system prevents users from attacking the system by forging MAC addresses.

18.1.2 Features

Increases the security of the operator network.

Increases the security of the user services.

18.1.3 Specifications

Supports obtaining the binding relationship between the source MAC address and
the user port during the PPPoE accessing process.

18.1.4 Basic Principles

The AN5516-06 monitors the PPPoE accessing flow. During the process of a
PPPoE user accessing, the AN5516-06 obtains the binding relationship between
the source MAC address and the user port. If other ONU ports forge this MAC
address to send packets to the AN5516-06, the AN5516-06 will prevent these ports
from doing so.

18-2 Version: A
18 User Security

18.1.5 Reference Information

Standards

None

Terminologies

None

Abbreviations

Abbreviation Meaning
MAC Media Access Control
PPPoE Point to Point Protocol over Ethernet

Version: A 18-3
AN5516-06 Optical Line Terminal Equipment Feature Description

18.2 Data Encryption of an EPON User

18.2.1 Definition

In the downlink direction, an EPON system uses the broadcast mode, and
malicious users are very easy to obtain the information of other users in the system.
So the EPON system uses the AES to perform the encryption of the user data. The
AES is a block password algorithm, and is operated based on the 16-byte (128-bit)
data block. The AN5516-06 uses the AES128 encryption algorithm, adopting the
128-bit key.

Note:

Currently only partial ONUs support the triple churning encryption.

18.2.2 Features

Increases the security of the EPON user data.

18.2.3 Specifications

Supports the encryption function based on each LLID.

18-4 Version: A
18 User Security

18.2.4 Basic Principles

AES encryption

The AES algorithm uses the symmetric packet password mechanism, the shortest
key length is 128 / 192 / 256 bits, and the packet length is 128 bits; the algorithm
should be easy to perform by various hardware and software types. For the
iteration symmetric packet encryption algorithm with variable-length key, its
encryption and decryption uses the same key, and the key exchange is initiated by
the AN5516-06. Before an ONU accesses the network, the AN5516-06 and the
ONU can pre-configure an SSK as the key seed for the data encryption of downlink
users. As soon as the key seed is configured and the ONU is started, the
AN5516-06 can initiate the key exchange and modification flow as required.

Triple churning

The triple churning algorithm adds the time domain association of the churned data
base on the single churning algorithm, so as to increase the security of the user
data.

The triple churning uses three concatenated churners. Each churner performs the
single churning operation, and each churning uses a different key. The level 1
churning of the triple churning uses the primal 24-bit key (X1 to X8, P1 to P16), the
level 2 churning uses the key (P9 to P16, X1 to X8, P1 to P8) generated by rotating
the primal 24-bit key to the right by 8 places, the level 3 churning uses the key (P1
to P16, X1 to X8) generated by rotating the primal 24-bit key to the right by 16
places.

18.2.5 Reference Information

Standards

IEEE802.3ah

Terminologies

None

Version: A 18-5
AN5516-06 Optical Line Terminal Equipment Feature Description

Abbreviations

Abbreviation Meaning
AES Advanced Encryption Standard
EPON Ethernet Passive Optical Network
LLID Logical Link Identifier
OAM Operation, Administration and Maintenance
OAMPDU OAM Protocol Data Unit
ONU Optical Network Unit
SSK Share Secret Key

18-6 Version: A
18 User Security

18.3 Data Encryption of a GPON User

18.3.1 Definition

The GPON system uses the AES to perform the encryption of the user data. The
AES is a block password algorithm, and is operated based on the 16-byte (128-bit)
data block. The AN5516-06 uses the AES128 encryption algorithm, adopting the
128-bit key.

18.3.2 Features

Increases the security of the GPON user data.

18.3.3 Specifications

Supports the encryption function based on the GEM port.

18.3.4 Basic Principles

Encryption algorithm

The AES algorithm generates a 16-byte pseudorandom code block flow, called the
AES cipher block or key. The AES cipher block performs the XOR operation with
the input plain text to output the cipher text, and the cipher text performs the XOR
operation with the same AES cipher block to generate the plain text again.

For a GEM segment, the encryption algorithm only encrypts its payload, but does
not encrypt its Port_ID frame header. The AES cipher block is arranged at the
starting position of the packet payload. Because a GEM segment is not always the
integral times of an AES cipher block, the data block trailer whose length is less
than 16 bytes performs the XOR operation with the most significant bit of the AES
cipher block trailer, and the redundant parts of the AES cipher block trailer are
discarded.

Version: A 18-7
AN5516-06 Optical Line Terminal Equipment Feature Description

Key exchange

The AN5516-06 initiates the key exchange. Before an ONU accesses the network,
the AN5516-06 and the ONU can pre-configure an SSK as the key seed for the
data encryption of downlink users. As soon as the key seed is configured and the
ONU is started, the AN5516-06 can initiate the key exchange and modification flow
as required. The detailed flow is described as follows:

1. The AN5516-06 sends a key modification request via the Request Key
Message broadcast or unicast in the downlink PLOAM channel.

2. After receiving the key update request, the ONU generates a 128-bit-long
random number RAND (its length should be the same as the key length).

3. The ONU sends the RAND to the AN5516-06 via the uplink PLOAM message
(Encryption Key Message). To ensure the redundancy, the ONU sends for
three times repeatedly.

4. Ensures that the AN5516-06 can receive the same RAND for three times
repeatedly.

5. The ONU calculates the key using the formula Key = f (SSK, RAND).

6. After receiving the RAND, the AN5516-06 also calculates the key using the
formula Key = f (SSK, RAND).

7. The AN5516-06 selects a certain frame No. as the first frame No. of the new
key, and transfers the multiframe No. of this frame to the ONU via the
Key_switching_time message. The Key_switching_time message is sent for
three times, and the ONU only needs to receive the correct copy for once to
know the modification time.

8. The ONU acknowledges its response via the Acknowledge message.

9. The AN5516-06 and the ONU start to use the new key to perform the
encryption and decryption of the downlink data.

18.3.5 Reference Information

Standards

ITU-T G.984.3

18-8 Version: A
18 User Security

Terminologies

None

Abbreviations

Abbreviation Meaning
AES Advanced Encryption Standard
GEM GPON Encapsulation Method
GPON Gigabit Passive Optical Network
PLOAM Physical Layer OAM
SSK Share Secret Key

Version: A 18-9
19 System Security

This chapter introduces the system security function, and includes the following
sections:

Anti-DoS attack

MAC address filtering

Version: A 19-1
AN5516-06 Optical Line Terminal Equipment Feature Description

19.1 Anti-DoS Attack

19.1.1 Definition

The denial of service (DoS) attack refers to an attack from a malicious user who
sends a large number of protocol packets, which results in denying service
requests of normal users by the system.

The anti-DoS attack feature refers to the defensive measures taken by the system
to control and limit the number of protocol packets sent from a user.

19.1.2 Features

The equipment can prevent users from launching the DoS attack with various types
of control packets, so as to increase its anti-attack performance and guarantee the
security.

19.1.3 Specifications

Supports preventing users from launching the DoS attack with various types of
control packets, and the attack packets include IP packet, ARP packet, DHCP
packet, ICMP packet, IGMP packet, BPDU packet, etc.

19.1.4 Basic Principles

After the CPU / memory utilization ratio classification function of the core switch
card is enabled, the system determines whether the DoS attack has occurred or
stopped according to the following steps:

1. The switch chip of the AN5516-06 core switch card analyzes the arrived
control packet and determines whether this packet is related to the DoS attack;
at the same time, it observes the CPU utilization in the collected real time
performance data. If the CPU utilization becomes too high suddenly, this
indicates that the AN5516-06 has encountered the DoS attack.

19-2 Version: A
19 System Security

2. When the DoS attack occurs, the system enables the anti-DoS attack function
via the core switch card, so as to prevent the control packets transferred to the
switch chip of the core switch card.

3. When the CPU utilization in the collected real time performance data reaches
a value lower than the standard threshold, this indicates that the equipment is
not DoS-attacked by the users any more.

Figure 19-1 The working principle of the anti-DoS attack

Version: A 19-3
AN5516-06 Optical Line Terminal Equipment Feature Description

19.1.5 Reference Information

Standards

None

Terminologies

None

Abbreviations

Abbreviation Meaning
ARP Address Resolution Protocol
BPDU Bridge Protocol Data Unit
DHCP Dynamic Host Configuration Protocol
DoS Denial of Service
ICMP Internet Control Message Protocol
IGMP Internet Group Management Protocol
IP Internet Protocol

19-4 Version: A
19 System Security

19.2 MAC Address Filtering

19.2.1 Definition

Filters MAC addresses by configuring the QoS profile. Its purpose is to control the
source or destination MAC addresses of user packets, and discard the packets
from a baleful user.

19.2.2 Features

This feature, which supports configuring the user packets without the source MAC
address or destination MAC address, is mainly to prevent the carriers' networks
from being attacked by a malicious user who forges the legal MAC address.

19.2.3 Specifications

Supports binding / unbinding with the QoS profile, so as to filter the uplink
packets based on the source or destination MAC address.

The maximum number of the MAC addresses that can be filtered is 2000.

19.2.4 Basic Principles

The principles to implement the MAC address filtering function are described as
follows.

In the uplink direction:

1. To avoid that a user forges the MAC address of the network side equipment,
the system sets the MAC address of the network side equipment as the source
MAC address to be filtered in the QoS profile, and binds this profile with the
card in the corresponding slot.

Version: A 19-5
AN5516-06 Optical Line Terminal Equipment Feature Description

2. When a user packet from this slot is transferred in the uplink direction, the
AN5516-06 will check the source MAC address of this packet; if the source
MAC address is the same as a certain MAC address to be filtered configured
in the QoS profile, the AN5516-06 will discard this packet.

In the downlink direction:

1. To avoid the packet attack from the network side equipment, the system sets
the MAC address of the network side equipment as the source MAC address
to be filtered in the QoS profile, and binds this profile with the corresponding
uplink port.

2. When a packet is transferred to this uplink port in the downlink direction, the
AN5516-06 will check the source MAC address of this packet; if the source
MAC address is the same as a certain MAC address to be filtered configured
in the QoS profile, the AN5516-06 will discard this packet.

19.2.5 Reference Information

Standards

None

Terminologies

None

Abbreviations

Abbreviation Meaning
MAC Medium Access Control
QoS Quality of Service

19-6 Version: A
Product Documentation Customer Satisfaction Survey
Thank you for reading and using the product documentation provided by FiberHome. Please take a
moment to complete this survey. Your answers will help us to improve the documentation and better
suit your needs. Your responses will be confidential and given serious consideration. The personal
information requested is used for no other purposes than to respond to your feedback.

Name
Phone Number
Email Address
Company

To help us better understand your needs, please focus your answers on a single documentation or a
complete documentation set.

Documentation Name
Code and Version

Usage of the product documentation:

1. How often do you use the documentation?


Frequently Rarely Never Other (please specify)

2. When do you use the documentation?


in starting up a project in installing the product in daily maintenance in
troubleshooting Other (please specify)

3. What is the percentage of the operations on the product for which you can get instruction from the
documentation?
100% 80% 50% 0% Other (please specify)

4. Are you satisfied with the promptness with which we update the documentation?

Satisfied Unsatisfied (your advice)

5. Which documentation form do you prefer?

Print edition Electronic edition Other (please specify)

Quality of the product documentation:

1. Is the information organized and presented clearly?

Very Somewhat Not at all (your advice)

2. How do you like the language style of the documentation?

Good Normal Poor (please specify)

3. Are any contents in the documentation inconsistent with the product?


4. Is the information complete in the documentation?

Yes

No (please specify)

5. Are the product working principles and the relevant technologies covered in the documentation
sufficient for you to get known and use the product?

Yes

No (please specify)

6. Can you successfully implement a task following the operation steps given in the documentation?

Yes (please give an example)

No (please specify the reason)

7. Which parts of the documentation are you satisfied with?

8. Which parts of the documentation are you unsatisfied with? Why?

9. What is your opinion on the Figures in the documentation?

Beautiful Unbeautiful (your advice)

Practical Unpractical (your advice)

10. What is your opinion on the layout of the documentation?

Beautiful Unbeautiful (your advice)

11. Thinking of the documentations you have ever read offered by other companies, how would you
compare our documentation to them?
Product documentations from other companies:

Satisfied (please specify)

Unsatisfied (please specify)

12. Additional comments about our documentation or suggestions on how we can improve:

Thank you for your assistance. Please fax or send the completed survey to us at the contact information
included in the documentation. If you have any questions or concerns about this survey please email at
edit@fiberhome.com.cn.

Das könnte Ihnen auch gefallen